dm-crypt.c 33.3 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3
/*
 * Copyright (C) 2003 Christophe Saout <christophe@saout.de>
 * Copyright (C) 2004 Clemens Fruhwirth <clemens@endorphin.org>
4
 * Copyright (C) 2006-2009 Red Hat, Inc. All rights reserved.
L
Linus Torvalds 已提交
5 6 7 8
 *
 * This file is released under the GPL.
 */

M
Milan Broz 已提交
9
#include <linux/completion.h>
10
#include <linux/err.h>
L
Linus Torvalds 已提交
11 12 13 14 15 16 17 18 19
#include <linux/module.h>
#include <linux/init.h>
#include <linux/kernel.h>
#include <linux/bio.h>
#include <linux/blkdev.h>
#include <linux/mempool.h>
#include <linux/slab.h>
#include <linux/crypto.h>
#include <linux/workqueue.h>
20
#include <linux/backing-dev.h>
L
Linus Torvalds 已提交
21
#include <asm/atomic.h>
22
#include <linux/scatterlist.h>
L
Linus Torvalds 已提交
23
#include <asm/page.h>
24
#include <asm/unaligned.h>
L
Linus Torvalds 已提交
25

26
#include <linux/device-mapper.h>
L
Linus Torvalds 已提交
27

28
#define DM_MSG_PREFIX "crypt"
M
Milan Broz 已提交
29
#define MESG_STR(x) x, sizeof(x)
L
Linus Torvalds 已提交
30 31 32 33 34

/*
 * context holding the current state of a multi-part conversion
 */
struct convert_context {
M
Milan Broz 已提交
35
	struct completion restart;
L
Linus Torvalds 已提交
36 37 38 39 40 41 42
	struct bio *bio_in;
	struct bio *bio_out;
	unsigned int offset_in;
	unsigned int offset_out;
	unsigned int idx_in;
	unsigned int idx_out;
	sector_t sector;
M
Milan Broz 已提交
43
	atomic_t pending;
L
Linus Torvalds 已提交
44 45
};

46 47 48 49 50 51 52 53 54 55 56 57
/*
 * per bio private data
 */
struct dm_crypt_io {
	struct dm_target *target;
	struct bio *base_bio;
	struct work_struct work;

	struct convert_context ctx;

	atomic_t pending;
	int error;
58
	sector_t sector;
M
Milan Broz 已提交
59
	struct dm_crypt_io *base_io;
60 61
};

62
struct dm_crypt_request {
63
	struct convert_context *ctx;
64 65 66 67
	struct scatterlist sg_in;
	struct scatterlist sg_out;
};

L
Linus Torvalds 已提交
68 69 70 71
struct crypt_config;

struct crypt_iv_operations {
	int (*ctr)(struct crypt_config *cc, struct dm_target *ti,
M
Milan Broz 已提交
72
		   const char *opts);
L
Linus Torvalds 已提交
73
	void (*dtr)(struct crypt_config *cc);
74
	int (*init)(struct crypt_config *cc);
75
	int (*wipe)(struct crypt_config *cc);
L
Linus Torvalds 已提交
76 77 78
	int (*generator)(struct crypt_config *cc, u8 *iv, sector_t sector);
};

79 80
struct iv_essiv_private {
	struct crypto_cipher *tfm;
81 82
	struct crypto_hash *hash_tfm;
	u8 *salt;
83 84 85 86 87 88
};

struct iv_benbi_private {
	int shift;
};

L
Linus Torvalds 已提交
89 90 91 92
/*
 * Crypt: maps a linear range of a block device
 * and encrypts / decrypts at the same time.
 */
M
Milan Broz 已提交
93
enum flags { DM_CRYPT_SUSPENDED, DM_CRYPT_KEY_VALID };
L
Linus Torvalds 已提交
94 95 96 97 98
struct crypt_config {
	struct dm_dev *dev;
	sector_t start;

	/*
M
Milan Broz 已提交
99 100
	 * pool for per bio private data, crypto requests and
	 * encryption requeusts/buffer pages
L
Linus Torvalds 已提交
101 102
	 */
	mempool_t *io_pool;
M
Milan Broz 已提交
103
	mempool_t *req_pool;
L
Linus Torvalds 已提交
104
	mempool_t *page_pool;
M
Milan Broz 已提交
105
	struct bio_set *bs;
L
Linus Torvalds 已提交
106

M
Milan Broz 已提交
107 108
	struct workqueue_struct *io_queue;
	struct workqueue_struct *crypt_queue;
M
Milan Broz 已提交
109

M
Milan Broz 已提交
110
	char *cipher;
111
	char *cipher_string;
M
Milan Broz 已提交
112

L
Linus Torvalds 已提交
113
	struct crypt_iv_operations *iv_gen_ops;
114
	union {
115 116
		struct iv_essiv_private essiv;
		struct iv_benbi_private benbi;
117
	} iv_gen_private;
L
Linus Torvalds 已提交
118 119 120
	sector_t iv_offset;
	unsigned int iv_size;

M
Milan Broz 已提交
121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136
	/*
	 * Layout of each crypto request:
	 *
	 *   struct ablkcipher_request
	 *      context
	 *      padding
	 *   struct dm_crypt_request
	 *      padding
	 *   IV
	 *
	 * The padding is added so that dm_crypt_request and the IV are
	 * correctly aligned.
	 */
	unsigned int dmreq_start;
	struct ablkcipher_request *req;

M
Milan Broz 已提交
137
	struct crypto_ablkcipher *tfm;
M
Milan Broz 已提交
138
	unsigned long flags;
L
Linus Torvalds 已提交
139 140 141 142
	unsigned int key_size;
	u8 key[0];
};

M
Milan Broz 已提交
143
#define MIN_IOS        16
L
Linus Torvalds 已提交
144 145 146
#define MIN_POOL_PAGES 32
#define MIN_BIO_PAGES  8

147
static struct kmem_cache *_crypt_io_pool;
L
Linus Torvalds 已提交
148

A
Alasdair G Kergon 已提交
149
static void clone_init(struct dm_crypt_io *, struct bio *);
150
static void kcryptd_queue_crypt(struct dm_crypt_io *io);
O
Olaf Kirch 已提交
151

L
Linus Torvalds 已提交
152 153 154
/*
 * Different IV generation algorithms:
 *
155
 * plain: the initial vector is the 32-bit little-endian version of the sector
156
 *        number, padded with zeros if necessary.
L
Linus Torvalds 已提交
157
 *
M
Milan Broz 已提交
158 159 160
 * plain64: the initial vector is the 64-bit little-endian version of the sector
 *        number, padded with zeros if necessary.
 *
161 162 163
 * essiv: "encrypted sector|salt initial vector", the sector number is
 *        encrypted with the bulk cipher using a salt as key. The salt
 *        should be derived from the bulk cipher's key via hashing.
L
Linus Torvalds 已提交
164
 *
165 166 167
 * benbi: the 64-bit "big-endian 'narrow block'-count", starting at 1
 *        (needed for LRW-32-AES and possible other narrow block modes)
 *
L
Ludwig Nussel 已提交
168 169 170
 * null: the initial vector is always zero.  Provides compatibility with
 *       obsolete loop_fish2 devices.  Do not use for new devices.
 *
L
Linus Torvalds 已提交
171 172 173 174 175 176 177 178 179 180 181 182
 * plumb: unimplemented, see:
 * http://article.gmane.org/gmane.linux.kernel.device-mapper.dm-crypt/454
 */

static int crypt_iv_plain_gen(struct crypt_config *cc, u8 *iv, sector_t sector)
{
	memset(iv, 0, cc->iv_size);
	*(u32 *)iv = cpu_to_le32(sector & 0xffffffff);

	return 0;
}

M
Milan Broz 已提交
183 184 185 186 187 188 189 190 191
static int crypt_iv_plain64_gen(struct crypt_config *cc, u8 *iv,
				sector_t sector)
{
	memset(iv, 0, cc->iv_size);
	*(u64 *)iv = cpu_to_le64(sector);

	return 0;
}

192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211
/* Initialise ESSIV - compute salt but no local memory allocations */
static int crypt_iv_essiv_init(struct crypt_config *cc)
{
	struct iv_essiv_private *essiv = &cc->iv_gen_private.essiv;
	struct hash_desc desc;
	struct scatterlist sg;
	int err;

	sg_init_one(&sg, cc->key, cc->key_size);
	desc.tfm = essiv->hash_tfm;
	desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;

	err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt);
	if (err)
		return err;

	return crypto_cipher_setkey(essiv->tfm, essiv->salt,
				    crypto_hash_digestsize(essiv->hash_tfm));
}

212 213 214 215 216 217 218 219 220 221 222
/* Wipe salt and reset key derived from volume key */
static int crypt_iv_essiv_wipe(struct crypt_config *cc)
{
	struct iv_essiv_private *essiv = &cc->iv_gen_private.essiv;
	unsigned salt_size = crypto_hash_digestsize(essiv->hash_tfm);

	memset(essiv->salt, 0, salt_size);

	return crypto_cipher_setkey(essiv->tfm, essiv->salt, salt_size);
}

223 224 225 226 227 228
static void crypt_iv_essiv_dtr(struct crypt_config *cc)
{
	struct iv_essiv_private *essiv = &cc->iv_gen_private.essiv;

	crypto_free_cipher(essiv->tfm);
	essiv->tfm = NULL;
229 230 231 232 233 234

	crypto_free_hash(essiv->hash_tfm);
	essiv->hash_tfm = NULL;

	kzfree(essiv->salt);
	essiv->salt = NULL;
235 236
}

L
Linus Torvalds 已提交
237
static int crypt_iv_essiv_ctr(struct crypt_config *cc, struct dm_target *ti,
M
Milan Broz 已提交
238
			      const char *opts)
L
Linus Torvalds 已提交
239
{
240 241 242
	struct crypto_cipher *essiv_tfm = NULL;
	struct crypto_hash *hash_tfm = NULL;
	u8 *salt = NULL;
243
	int err;
L
Linus Torvalds 已提交
244

245
	if (!opts) {
246
		ti->error = "Digest algorithm missing for ESSIV mode";
L
Linus Torvalds 已提交
247 248 249
		return -EINVAL;
	}

250
	/* Allocate hash algorithm */
251 252
	hash_tfm = crypto_alloc_hash(opts, 0, CRYPTO_ALG_ASYNC);
	if (IS_ERR(hash_tfm)) {
253
		ti->error = "Error initializing ESSIV hash";
254 255
		err = PTR_ERR(hash_tfm);
		goto bad;
L
Linus Torvalds 已提交
256 257
	}

258
	salt = kzalloc(crypto_hash_digestsize(hash_tfm), GFP_KERNEL);
259
	if (!salt) {
260
		ti->error = "Error kmallocing salt storage in ESSIV";
261 262
		err = -ENOMEM;
		goto bad;
L
Linus Torvalds 已提交
263 264
	}

265
	/* Allocate essiv_tfm */
266 267
	essiv_tfm = crypto_alloc_cipher(cc->cipher, 0, CRYPTO_ALG_ASYNC);
	if (IS_ERR(essiv_tfm)) {
268
		ti->error = "Error allocating crypto tfm for ESSIV";
269 270
		err = PTR_ERR(essiv_tfm);
		goto bad;
L
Linus Torvalds 已提交
271
	}
272
	if (crypto_cipher_blocksize(essiv_tfm) !=
M
Milan Broz 已提交
273
	    crypto_ablkcipher_ivsize(cc->tfm)) {
274
		ti->error = "Block size of ESSIV cipher does "
M
Milan Broz 已提交
275
			    "not match IV size of block cipher";
276 277
		err = -EINVAL;
		goto bad;
L
Linus Torvalds 已提交
278 279
	}

280
	cc->iv_gen_private.essiv.salt = salt;
281
	cc->iv_gen_private.essiv.tfm = essiv_tfm;
282 283
	cc->iv_gen_private.essiv.hash_tfm = hash_tfm;

L
Linus Torvalds 已提交
284
	return 0;
285 286 287 288 289 290

bad:
	if (essiv_tfm && !IS_ERR(essiv_tfm))
		crypto_free_cipher(essiv_tfm);
	if (hash_tfm && !IS_ERR(hash_tfm))
		crypto_free_hash(hash_tfm);
291
	kfree(salt);
292
	return err;
L
Linus Torvalds 已提交
293 294 295 296 297 298
}

static int crypt_iv_essiv_gen(struct crypt_config *cc, u8 *iv, sector_t sector)
{
	memset(iv, 0, cc->iv_size);
	*(u64 *)iv = cpu_to_le64(sector);
299
	crypto_cipher_encrypt_one(cc->iv_gen_private.essiv.tfm, iv, iv);
L
Linus Torvalds 已提交
300 301 302
	return 0;
}

303 304 305
static int crypt_iv_benbi_ctr(struct crypt_config *cc, struct dm_target *ti,
			      const char *opts)
{
M
Milan Broz 已提交
306
	unsigned bs = crypto_ablkcipher_blocksize(cc->tfm);
307
	int log = ilog2(bs);
308 309 310 311 312 313 314 315 316 317 318 319 320 321

	/* we need to calculate how far we must shift the sector count
	 * to get the cipher block count, we use this shift in _gen */

	if (1 << log != bs) {
		ti->error = "cypher blocksize is not a power of 2";
		return -EINVAL;
	}

	if (log > 9) {
		ti->error = "cypher blocksize is > 512";
		return -EINVAL;
	}

322
	cc->iv_gen_private.benbi.shift = 9 - log;
323 324 325 326 327 328 329 330 331 332

	return 0;
}

static void crypt_iv_benbi_dtr(struct crypt_config *cc)
{
}

static int crypt_iv_benbi_gen(struct crypt_config *cc, u8 *iv, sector_t sector)
{
333 334
	__be64 val;

335
	memset(iv, 0, cc->iv_size - sizeof(u64)); /* rest is cleared below */
336

337
	val = cpu_to_be64(((u64)sector << cc->iv_gen_private.benbi.shift) + 1);
338
	put_unaligned(val, (__be64 *)(iv + cc->iv_size - sizeof(u64)));
339

L
Linus Torvalds 已提交
340 341 342
	return 0;
}

L
Ludwig Nussel 已提交
343 344 345 346 347 348 349
static int crypt_iv_null_gen(struct crypt_config *cc, u8 *iv, sector_t sector)
{
	memset(iv, 0, cc->iv_size);

	return 0;
}

L
Linus Torvalds 已提交
350 351 352 353
static struct crypt_iv_operations crypt_iv_plain_ops = {
	.generator = crypt_iv_plain_gen
};

M
Milan Broz 已提交
354 355 356 357
static struct crypt_iv_operations crypt_iv_plain64_ops = {
	.generator = crypt_iv_plain64_gen
};

L
Linus Torvalds 已提交
358 359 360
static struct crypt_iv_operations crypt_iv_essiv_ops = {
	.ctr       = crypt_iv_essiv_ctr,
	.dtr       = crypt_iv_essiv_dtr,
361
	.init      = crypt_iv_essiv_init,
362
	.wipe      = crypt_iv_essiv_wipe,
L
Linus Torvalds 已提交
363 364 365
	.generator = crypt_iv_essiv_gen
};

366 367 368 369 370
static struct crypt_iv_operations crypt_iv_benbi_ops = {
	.ctr	   = crypt_iv_benbi_ctr,
	.dtr	   = crypt_iv_benbi_dtr,
	.generator = crypt_iv_benbi_gen
};
L
Linus Torvalds 已提交
371

L
Ludwig Nussel 已提交
372 373 374 375
static struct crypt_iv_operations crypt_iv_null_ops = {
	.generator = crypt_iv_null_gen
};

M
Milan Broz 已提交
376 377 378
static void crypt_convert_init(struct crypt_config *cc,
			       struct convert_context *ctx,
			       struct bio *bio_out, struct bio *bio_in,
379
			       sector_t sector)
L
Linus Torvalds 已提交
380 381 382 383 384 385 386 387
{
	ctx->bio_in = bio_in;
	ctx->bio_out = bio_out;
	ctx->offset_in = 0;
	ctx->offset_out = 0;
	ctx->idx_in = bio_in ? bio_in->bi_idx : 0;
	ctx->idx_out = bio_out ? bio_out->bi_idx : 0;
	ctx->sector = sector + cc->iv_offset;
M
Milan Broz 已提交
388
	init_completion(&ctx->restart);
L
Linus Torvalds 已提交
389 390
}

391 392 393 394 395 396 397 398 399 400 401 402
static struct dm_crypt_request *dmreq_of_req(struct crypt_config *cc,
					     struct ablkcipher_request *req)
{
	return (struct dm_crypt_request *)((char *)req + cc->dmreq_start);
}

static struct ablkcipher_request *req_of_dmreq(struct crypt_config *cc,
					       struct dm_crypt_request *dmreq)
{
	return (struct ablkcipher_request *)((char *)dmreq - cc->dmreq_start);
}

403
static int crypt_convert_block(struct crypt_config *cc,
M
Milan Broz 已提交
404 405
			       struct convert_context *ctx,
			       struct ablkcipher_request *req)
406 407 408
{
	struct bio_vec *bv_in = bio_iovec_idx(ctx->bio_in, ctx->idx_in);
	struct bio_vec *bv_out = bio_iovec_idx(ctx->bio_out, ctx->idx_out);
M
Milan Broz 已提交
409 410 411 412
	struct dm_crypt_request *dmreq;
	u8 *iv;
	int r = 0;

413
	dmreq = dmreq_of_req(cc, req);
M
Milan Broz 已提交
414 415
	iv = (u8 *)ALIGN((unsigned long)(dmreq + 1),
			 crypto_ablkcipher_alignmask(cc->tfm) + 1);
416

417
	dmreq->ctx = ctx;
M
Milan Broz 已提交
418 419
	sg_init_table(&dmreq->sg_in, 1);
	sg_set_page(&dmreq->sg_in, bv_in->bv_page, 1 << SECTOR_SHIFT,
420 421
		    bv_in->bv_offset + ctx->offset_in);

M
Milan Broz 已提交
422 423
	sg_init_table(&dmreq->sg_out, 1);
	sg_set_page(&dmreq->sg_out, bv_out->bv_page, 1 << SECTOR_SHIFT,
424 425 426 427 428 429 430 431 432 433 434 435 436 437
		    bv_out->bv_offset + ctx->offset_out);

	ctx->offset_in += 1 << SECTOR_SHIFT;
	if (ctx->offset_in >= bv_in->bv_len) {
		ctx->offset_in = 0;
		ctx->idx_in++;
	}

	ctx->offset_out += 1 << SECTOR_SHIFT;
	if (ctx->offset_out >= bv_out->bv_len) {
		ctx->offset_out = 0;
		ctx->idx_out++;
	}

M
Milan Broz 已提交
438 439 440 441 442 443 444 445 446 447 448 449 450 451 452
	if (cc->iv_gen_ops) {
		r = cc->iv_gen_ops->generator(cc, iv, ctx->sector);
		if (r < 0)
			return r;
	}

	ablkcipher_request_set_crypt(req, &dmreq->sg_in, &dmreq->sg_out,
				     1 << SECTOR_SHIFT, iv);

	if (bio_data_dir(ctx->bio_in) == WRITE)
		r = crypto_ablkcipher_encrypt(req);
	else
		r = crypto_ablkcipher_decrypt(req);

	return r;
453 454
}

M
Milan Broz 已提交
455 456
static void kcryptd_async_done(struct crypto_async_request *async_req,
			       int error);
M
Milan Broz 已提交
457 458 459 460 461
static void crypt_alloc_req(struct crypt_config *cc,
			    struct convert_context *ctx)
{
	if (!cc->req)
		cc->req = mempool_alloc(cc->req_pool, GFP_NOIO);
M
Milan Broz 已提交
462 463
	ablkcipher_request_set_tfm(cc->req, cc->tfm);
	ablkcipher_request_set_callback(cc->req, CRYPTO_TFM_REQ_MAY_BACKLOG |
464 465 466
					CRYPTO_TFM_REQ_MAY_SLEEP,
					kcryptd_async_done,
					dmreq_of_req(cc, cc->req));
M
Milan Broz 已提交
467 468
}

L
Linus Torvalds 已提交
469 470 471 472
/*
 * Encrypt / decrypt data from one bio to another one (can be the same one)
 */
static int crypt_convert(struct crypt_config *cc,
M
Milan Broz 已提交
473
			 struct convert_context *ctx)
L
Linus Torvalds 已提交
474
{
M
Milan Broz 已提交
475
	int r;
L
Linus Torvalds 已提交
476

M
Milan Broz 已提交
477 478
	atomic_set(&ctx->pending, 1);

L
Linus Torvalds 已提交
479 480 481
	while(ctx->idx_in < ctx->bio_in->bi_vcnt &&
	      ctx->idx_out < ctx->bio_out->bi_vcnt) {

M
Milan Broz 已提交
482 483
		crypt_alloc_req(cc, ctx);

M
Milan Broz 已提交
484 485
		atomic_inc(&ctx->pending);

M
Milan Broz 已提交
486 487 488
		r = crypt_convert_block(cc, ctx, cc->req);

		switch (r) {
M
Milan Broz 已提交
489
		/* async */
M
Milan Broz 已提交
490 491 492 493 494 495
		case -EBUSY:
			wait_for_completion(&ctx->restart);
			INIT_COMPLETION(ctx->restart);
			/* fall through*/
		case -EINPROGRESS:
			cc->req = NULL;
M
Milan Broz 已提交
496 497 498 499
			ctx->sector++;
			continue;

		/* sync */
M
Milan Broz 已提交
500
		case 0:
M
Milan Broz 已提交
501
			atomic_dec(&ctx->pending);
M
Milan Broz 已提交
502
			ctx->sector++;
M
Milan Broz 已提交
503
			cond_resched();
M
Milan Broz 已提交
504 505
			continue;

M
Milan Broz 已提交
506 507 508 509 510
		/* error */
		default:
			atomic_dec(&ctx->pending);
			return r;
		}
L
Linus Torvalds 已提交
511 512
	}

M
Milan Broz 已提交
513
	return 0;
L
Linus Torvalds 已提交
514 515
}

M
Milan Broz 已提交
516 517
static void dm_crypt_bio_destructor(struct bio *bio)
{
A
Alasdair G Kergon 已提交
518
	struct dm_crypt_io *io = bio->bi_private;
M
Milan Broz 已提交
519 520 521
	struct crypt_config *cc = io->target->private;

	bio_free(bio, cc->bs);
M
Milan Broz 已提交
522
}
M
Milan Broz 已提交
523

L
Linus Torvalds 已提交
524 525 526
/*
 * Generate a new unfragmented bio with the given size
 * This should never violate the device limitations
527 528
 * May return a smaller bio when running out of pages, indicated by
 * *out_of_pages set to 1.
L
Linus Torvalds 已提交
529
 */
530 531
static struct bio *crypt_alloc_buffer(struct dm_crypt_io *io, unsigned size,
				      unsigned *out_of_pages)
L
Linus Torvalds 已提交
532
{
O
Olaf Kirch 已提交
533
	struct crypt_config *cc = io->target->private;
534
	struct bio *clone;
L
Linus Torvalds 已提交
535
	unsigned int nr_iovecs = (size + PAGE_SIZE - 1) >> PAGE_SHIFT;
536
	gfp_t gfp_mask = GFP_NOIO | __GFP_HIGHMEM;
M
Milan Broz 已提交
537 538
	unsigned i, len;
	struct page *page;
L
Linus Torvalds 已提交
539

O
Olaf Kirch 已提交
540
	clone = bio_alloc_bioset(GFP_NOIO, nr_iovecs, cc->bs);
541
	if (!clone)
L
Linus Torvalds 已提交
542 543
		return NULL;

O
Olaf Kirch 已提交
544
	clone_init(io, clone);
545
	*out_of_pages = 0;
M
Milan Broz 已提交
546

547
	for (i = 0; i < nr_iovecs; i++) {
M
Milan Broz 已提交
548
		page = mempool_alloc(cc->page_pool, gfp_mask);
549 550
		if (!page) {
			*out_of_pages = 1;
L
Linus Torvalds 已提交
551
			break;
552
		}
L
Linus Torvalds 已提交
553 554 555 556 557 558

		/*
		 * if additional pages cannot be allocated without waiting,
		 * return a partially allocated bio, the caller will then try
		 * to allocate additional bios while submitting this partial bio
		 */
559
		if (i == (MIN_BIO_PAGES - 1))
L
Linus Torvalds 已提交
560 561
			gfp_mask = (gfp_mask | __GFP_NOWARN) & ~__GFP_WAIT;

M
Milan Broz 已提交
562 563 564 565 566 567
		len = (size > PAGE_SIZE) ? PAGE_SIZE : size;

		if (!bio_add_page(clone, page, len, 0)) {
			mempool_free(page, cc->page_pool);
			break;
		}
L
Linus Torvalds 已提交
568

M
Milan Broz 已提交
569
		size -= len;
L
Linus Torvalds 已提交
570 571
	}

572 573
	if (!clone->bi_size) {
		bio_put(clone);
L
Linus Torvalds 已提交
574 575 576
		return NULL;
	}

577
	return clone;
L
Linus Torvalds 已提交
578 579
}

N
Neil Brown 已提交
580
static void crypt_free_buffer_pages(struct crypt_config *cc, struct bio *clone)
L
Linus Torvalds 已提交
581
{
N
Neil Brown 已提交
582
	unsigned int i;
L
Linus Torvalds 已提交
583 584
	struct bio_vec *bv;

N
Neil Brown 已提交
585
	for (i = 0; i < clone->bi_vcnt; i++) {
586
		bv = bio_iovec_idx(clone, i);
L
Linus Torvalds 已提交
587 588 589 590 591 592
		BUG_ON(!bv->bv_page);
		mempool_free(bv->bv_page, cc->page_pool);
		bv->bv_page = NULL;
	}
}

M
Milan Broz 已提交
593 594 595 596 597 598 599 600 601 602 603
static struct dm_crypt_io *crypt_io_alloc(struct dm_target *ti,
					  struct bio *bio, sector_t sector)
{
	struct crypt_config *cc = ti->private;
	struct dm_crypt_io *io;

	io = mempool_alloc(cc->io_pool, GFP_NOIO);
	io->target = ti;
	io->base_bio = bio;
	io->sector = sector;
	io->error = 0;
M
Milan Broz 已提交
604
	io->base_io = NULL;
M
Milan Broz 已提交
605 606 607 608 609
	atomic_set(&io->pending, 0);

	return io;
}

M
Milan Broz 已提交
610 611 612 613 614
static void crypt_inc_pending(struct dm_crypt_io *io)
{
	atomic_inc(&io->pending);
}

L
Linus Torvalds 已提交
615 616 617
/*
 * One of the bios was finished. Check for completion of
 * the whole request and correctly clean up the buffer.
M
Milan Broz 已提交
618
 * If base_io is set, wait for the last fragment to complete.
L
Linus Torvalds 已提交
619
 */
620
static void crypt_dec_pending(struct dm_crypt_io *io)
L
Linus Torvalds 已提交
621
{
622
	struct crypt_config *cc = io->target->private;
623 624 625
	struct bio *base_bio = io->base_bio;
	struct dm_crypt_io *base_io = io->base_io;
	int error = io->error;
L
Linus Torvalds 已提交
626 627 628 629

	if (!atomic_dec_and_test(&io->pending))
		return;

630 631 632 633
	mempool_free(io, cc->io_pool);

	if (likely(!base_io))
		bio_endio(base_bio, error);
M
Milan Broz 已提交
634
	else {
635 636 637
		if (error && !base_io->error)
			base_io->error = error;
		crypt_dec_pending(base_io);
M
Milan Broz 已提交
638
	}
L
Linus Torvalds 已提交
639 640 641
}

/*
M
Milan Broz 已提交
642
 * kcryptd/kcryptd_io:
L
Linus Torvalds 已提交
643 644
 *
 * Needed because it would be very unwise to do decryption in an
645
 * interrupt context.
M
Milan Broz 已提交
646 647 648 649 650 651 652 653
 *
 * kcryptd performs the actual encryption or decryption.
 *
 * kcryptd_io performs the IO submission.
 *
 * They must be separated as otherwise the final stages could be
 * starved by new requests which can block in the first stages due
 * to memory allocation.
L
Linus Torvalds 已提交
654
 */
655
static void crypt_endio(struct bio *clone, int error)
656
{
A
Alasdair G Kergon 已提交
657
	struct dm_crypt_io *io = clone->bi_private;
658
	struct crypt_config *cc = io->target->private;
M
Milan Broz 已提交
659
	unsigned rw = bio_data_dir(clone);
660

M
Milan Broz 已提交
661 662 663
	if (unlikely(!bio_flagged(clone, BIO_UPTODATE) && !error))
		error = -EIO;

664
	/*
665
	 * free the processed pages
666
	 */
M
Milan Broz 已提交
667
	if (rw == WRITE)
N
Neil Brown 已提交
668
		crypt_free_buffer_pages(cc, clone);
669 670 671

	bio_put(clone);

M
Milan Broz 已提交
672 673 674 675
	if (rw == READ && !error) {
		kcryptd_queue_crypt(io);
		return;
	}
676 677 678 679 680

	if (unlikely(error))
		io->error = error;

	crypt_dec_pending(io);
681 682
}

A
Alasdair G Kergon 已提交
683
static void clone_init(struct dm_crypt_io *io, struct bio *clone)
684 685 686 687 688 689 690
{
	struct crypt_config *cc = io->target->private;

	clone->bi_private = io;
	clone->bi_end_io  = crypt_endio;
	clone->bi_bdev    = cc->dev->bdev;
	clone->bi_rw      = io->base_bio->bi_rw;
O
Olaf Kirch 已提交
691
	clone->bi_destructor = dm_crypt_bio_destructor;
692 693
}

694
static void kcryptd_io_read(struct dm_crypt_io *io)
695 696 697 698
{
	struct crypt_config *cc = io->target->private;
	struct bio *base_bio = io->base_bio;
	struct bio *clone;
699

M
Milan Broz 已提交
700
	crypt_inc_pending(io);
701 702 703 704 705 706

	/*
	 * The block layer might modify the bvec array, so always
	 * copy the required bvecs because we need the original
	 * one in order to decrypt the whole bio data *afterwards*.
	 */
M
Milan Broz 已提交
707
	clone = bio_alloc_bioset(GFP_NOIO, bio_segments(base_bio), cc->bs);
708
	if (unlikely(!clone)) {
709 710
		io->error = -ENOMEM;
		crypt_dec_pending(io);
711
		return;
712
	}
713 714 715 716 717

	clone_init(io, clone);
	clone->bi_idx = 0;
	clone->bi_vcnt = bio_segments(base_bio);
	clone->bi_size = base_bio->bi_size;
718
	clone->bi_sector = cc->start + io->sector;
719 720 721
	memcpy(clone->bi_io_vec, bio_iovec(base_bio),
	       sizeof(struct bio_vec) * clone->bi_vcnt);

722
	generic_make_request(clone);
723 724
}

725 726
static void kcryptd_io_write(struct dm_crypt_io *io)
{
M
Milan Broz 已提交
727 728
	struct bio *clone = io->ctx.bio_out;
	generic_make_request(clone);
729 730
}

731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748
static void kcryptd_io(struct work_struct *work)
{
	struct dm_crypt_io *io = container_of(work, struct dm_crypt_io, work);

	if (bio_data_dir(io->base_bio) == READ)
		kcryptd_io_read(io);
	else
		kcryptd_io_write(io);
}

static void kcryptd_queue_io(struct dm_crypt_io *io)
{
	struct crypt_config *cc = io->target->private;

	INIT_WORK(&io->work, kcryptd_io);
	queue_work(cc->io_queue, &io->work);
}

M
Milan Broz 已提交
749 750
static void kcryptd_crypt_write_io_submit(struct dm_crypt_io *io,
					  int error, int async)
751
{
M
Milan Broz 已提交
752 753 754 755 756 757 758
	struct bio *clone = io->ctx.bio_out;
	struct crypt_config *cc = io->target->private;

	if (unlikely(error < 0)) {
		crypt_free_buffer_pages(cc, clone);
		bio_put(clone);
		io->error = -EIO;
759
		crypt_dec_pending(io);
M
Milan Broz 已提交
760 761 762 763 764 765 766
		return;
	}

	/* crypt_convert should have filled the clone bio */
	BUG_ON(io->ctx.idx_out < clone->bi_vcnt);

	clone->bi_sector = cc->start + io->sector;
M
Milan Broz 已提交
767

M
Milan Broz 已提交
768 769
	if (async)
		kcryptd_queue_io(io);
770
	else
M
Milan Broz 已提交
771
		generic_make_request(clone);
772 773
}

M
Milan Broz 已提交
774
static void kcryptd_crypt_write_convert(struct dm_crypt_io *io)
775 776 777
{
	struct crypt_config *cc = io->target->private;
	struct bio *clone;
M
Milan Broz 已提交
778
	struct dm_crypt_io *new_io;
M
Milan Broz 已提交
779
	int crypt_finished;
780
	unsigned out_of_pages = 0;
M
Milan Broz 已提交
781
	unsigned remaining = io->base_bio->bi_size;
M
Milan Broz 已提交
782
	sector_t sector = io->sector;
M
Milan Broz 已提交
783
	int r;
784

M
Milan Broz 已提交
785 786 787 788
	/*
	 * Prevent io from disappearing until this function completes.
	 */
	crypt_inc_pending(io);
M
Milan Broz 已提交
789
	crypt_convert_init(cc, &io->ctx, NULL, io->base_bio, sector);
M
Milan Broz 已提交
790

791 792 793 794 795
	/*
	 * The allocated buffers can be smaller than the whole bio,
	 * so repeat the whole process until all the data can be handled.
	 */
	while (remaining) {
796
		clone = crypt_alloc_buffer(io, remaining, &out_of_pages);
797
		if (unlikely(!clone)) {
798
			io->error = -ENOMEM;
M
Milan Broz 已提交
799
			break;
800
		}
801

802 803
		io->ctx.bio_out = clone;
		io->ctx.idx_out = 0;
804

M
Milan Broz 已提交
805
		remaining -= clone->bi_size;
M
Milan Broz 已提交
806
		sector += bio_sectors(clone);
807

M
Milan Broz 已提交
808
		crypt_inc_pending(io);
M
Milan Broz 已提交
809
		r = crypt_convert(cc, &io->ctx);
M
Milan Broz 已提交
810
		crypt_finished = atomic_dec_and_test(&io->ctx.pending);
811

M
Milan Broz 已提交
812 813
		/* Encryption was already finished, submit io now */
		if (crypt_finished) {
M
Milan Broz 已提交
814
			kcryptd_crypt_write_io_submit(io, r, 0);
M
Milan Broz 已提交
815 816 817 818 819

			/*
			 * If there was an error, do not try next fragments.
			 * For async, error is processed in async handler.
			 */
820
			if (unlikely(r < 0))
M
Milan Broz 已提交
821
				break;
M
Milan Broz 已提交
822 823

			io->sector = sector;
M
Milan Broz 已提交
824
		}
825

826 827 828 829 830
		/*
		 * Out of memory -> run queues
		 * But don't wait if split was due to the io size restriction
		 */
		if (unlikely(out_of_pages))
831
			congestion_wait(BLK_RW_ASYNC, HZ/100);
832

M
Milan Broz 已提交
833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859
		/*
		 * With async crypto it is unsafe to share the crypto context
		 * between fragments, so switch to a new dm_crypt_io structure.
		 */
		if (unlikely(!crypt_finished && remaining)) {
			new_io = crypt_io_alloc(io->target, io->base_bio,
						sector);
			crypt_inc_pending(new_io);
			crypt_convert_init(cc, &new_io->ctx, NULL,
					   io->base_bio, sector);
			new_io->ctx.idx_in = io->ctx.idx_in;
			new_io->ctx.offset_in = io->ctx.offset_in;

			/*
			 * Fragments after the first use the base_io
			 * pending count.
			 */
			if (!io->base_io)
				new_io->base_io = io;
			else {
				new_io->base_io = io->base_io;
				crypt_inc_pending(io->base_io);
				crypt_dec_pending(io);
			}

			io = new_io;
		}
860
	}
M
Milan Broz 已提交
861 862

	crypt_dec_pending(io);
863 864
}

865
static void kcryptd_crypt_read_done(struct dm_crypt_io *io, int error)
866 867 868 869 870 871 872
{
	if (unlikely(error < 0))
		io->error = -EIO;

	crypt_dec_pending(io);
}

873
static void kcryptd_crypt_read_convert(struct dm_crypt_io *io)
874 875
{
	struct crypt_config *cc = io->target->private;
876
	int r = 0;
L
Linus Torvalds 已提交
877

M
Milan Broz 已提交
878
	crypt_inc_pending(io);
M
Milan Broz 已提交
879

880
	crypt_convert_init(cc, &io->ctx, io->base_bio, io->base_bio,
881
			   io->sector);
L
Linus Torvalds 已提交
882

883 884
	r = crypt_convert(cc, &io->ctx);

M
Milan Broz 已提交
885
	if (atomic_dec_and_test(&io->ctx.pending))
M
Milan Broz 已提交
886 887 888
		kcryptd_crypt_read_done(io, r);

	crypt_dec_pending(io);
L
Linus Torvalds 已提交
889 890
}

M
Milan Broz 已提交
891 892 893
static void kcryptd_async_done(struct crypto_async_request *async_req,
			       int error)
{
894 895
	struct dm_crypt_request *dmreq = async_req->data;
	struct convert_context *ctx = dmreq->ctx;
M
Milan Broz 已提交
896 897 898 899 900 901 902 903
	struct dm_crypt_io *io = container_of(ctx, struct dm_crypt_io, ctx);
	struct crypt_config *cc = io->target->private;

	if (error == -EINPROGRESS) {
		complete(&ctx->restart);
		return;
	}

904
	mempool_free(req_of_dmreq(cc, dmreq), cc->req_pool);
M
Milan Broz 已提交
905 906 907 908 909 910 911 912 913 914

	if (!atomic_dec_and_test(&ctx->pending))
		return;

	if (bio_data_dir(io->base_bio) == READ)
		kcryptd_crypt_read_done(io, error);
	else
		kcryptd_crypt_write_io_submit(io, error, 1);
}

915
static void kcryptd_crypt(struct work_struct *work)
L
Linus Torvalds 已提交
916
{
A
Alasdair G Kergon 已提交
917
	struct dm_crypt_io *io = container_of(work, struct dm_crypt_io, work);
918

M
Milan Broz 已提交
919
	if (bio_data_dir(io->base_bio) == READ)
920
		kcryptd_crypt_read_convert(io);
921
	else
922
		kcryptd_crypt_write_convert(io);
M
Milan Broz 已提交
923 924
}

925
static void kcryptd_queue_crypt(struct dm_crypt_io *io)
M
Milan Broz 已提交
926
{
927
	struct crypt_config *cc = io->target->private;
M
Milan Broz 已提交
928

929 930
	INIT_WORK(&io->work, kcryptd_crypt);
	queue_work(cc->crypt_queue, &io->work);
L
Linus Torvalds 已提交
931 932 933 934 935 936 937 938 939 940 941 942 943
}

/*
 * Decode key from its hex representation
 */
static int crypt_decode_key(u8 *key, char *hex, unsigned int size)
{
	char buffer[3];
	char *endp;
	unsigned int i;

	buffer[2] = '\0';

944
	for (i = 0; i < size; i++) {
L
Linus Torvalds 已提交
945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966
		buffer[0] = *hex++;
		buffer[1] = *hex++;

		key[i] = (u8)simple_strtoul(buffer, &endp, 16);

		if (endp != &buffer[2])
			return -EINVAL;
	}

	if (*hex != '\0')
		return -EINVAL;

	return 0;
}

/*
 * Encode key into its hex representation
 */
static void crypt_encode_key(char *hex, u8 *key, unsigned int size)
{
	unsigned int i;

967
	for (i = 0; i < size; i++) {
L
Linus Torvalds 已提交
968 969 970 971 972 973
		sprintf(hex, "%02x", *key);
		hex += 2;
		key++;
	}
}

M
Milan Broz 已提交
974 975
static int crypt_set_key(struct crypt_config *cc, char *key)
{
M
Milan Broz 已提交
976 977
	/* The key size may not be changed. */
	if (cc->key_size != (strlen(key) >> 1))
M
Milan Broz 已提交
978 979
		return -EINVAL;

M
Milan Broz 已提交
980 981 982
	/* Hyphen (which gives a key_size of zero) means there is no key. */
	if (!cc->key_size && strcmp(key, "-"))
		return -EINVAL;
M
Milan Broz 已提交
983

M
Milan Broz 已提交
984
	if (cc->key_size && crypt_decode_key(cc->key, key, cc->key_size) < 0)
M
Milan Broz 已提交
985 986 987 988
		return -EINVAL;

	set_bit(DM_CRYPT_KEY_VALID, &cc->flags);

989
	return crypto_ablkcipher_setkey(cc->tfm, cc->key, cc->key_size);
M
Milan Broz 已提交
990 991 992 993 994 995
}

static int crypt_wipe_key(struct crypt_config *cc)
{
	clear_bit(DM_CRYPT_KEY_VALID, &cc->flags);
	memset(&cc->key, 0, cc->key_size * sizeof(u8));
996
	return crypto_ablkcipher_setkey(cc->tfm, cc->key, cc->key_size);
M
Milan Broz 已提交
997 998
}

999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031
static void crypt_dtr(struct dm_target *ti)
{
	struct crypt_config *cc = ti->private;

	ti->private = NULL;

	if (!cc)
		return;

	if (cc->io_queue)
		destroy_workqueue(cc->io_queue);
	if (cc->crypt_queue)
		destroy_workqueue(cc->crypt_queue);

	if (cc->bs)
		bioset_free(cc->bs);

	if (cc->page_pool)
		mempool_destroy(cc->page_pool);
	if (cc->req_pool)
		mempool_destroy(cc->req_pool);
	if (cc->io_pool)
		mempool_destroy(cc->io_pool);

	if (cc->iv_gen_ops && cc->iv_gen_ops->dtr)
		cc->iv_gen_ops->dtr(cc);

	if (cc->tfm && !IS_ERR(cc->tfm))
		crypto_free_ablkcipher(cc->tfm);

	if (cc->dev)
		dm_put_device(ti, cc->dev);

M
Milan Broz 已提交
1032
	kzfree(cc->cipher);
1033
	kzfree(cc->cipher_string);
1034 1035 1036 1037 1038

	/* Must zero key material before freeing */
	kzfree(cc);
}

M
Milan Broz 已提交
1039 1040
static int crypt_ctr_cipher(struct dm_target *ti,
			    char *cipher_in, char *key)
L
Linus Torvalds 已提交
1041
{
M
Milan Broz 已提交
1042 1043 1044
	struct crypt_config *cc = ti->private;
	char *tmp, *cipher, *chainmode, *ivmode, *ivopts;
	char *cipher_api = NULL;
1045
	int ret = -EINVAL;
L
Linus Torvalds 已提交
1046

M
Milan Broz 已提交
1047 1048 1049
	/* Convert to crypto api definition? */
	if (strchr(cipher_in, '(')) {
		ti->error = "Bad cipher specification";
L
Linus Torvalds 已提交
1050 1051 1052
		return -EINVAL;
	}

1053 1054 1055 1056
	cc->cipher_string = kstrdup(cipher_in, GFP_KERNEL);
	if (!cc->cipher_string)
		goto bad_mem;

M
Milan Broz 已提交
1057 1058 1059 1060 1061
	/*
	 * Legacy dm-crypt cipher specification
	 * cipher-mode-iv:ivopts
	 */
	tmp = cipher_in;
L
Linus Torvalds 已提交
1062
	cipher = strsep(&tmp, "-");
M
Milan Broz 已提交
1063 1064 1065 1066 1067

	cc->cipher = kstrdup(cipher, GFP_KERNEL);
	if (!cc->cipher)
		goto bad_mem;

L
Linus Torvalds 已提交
1068 1069 1070 1071 1072
	chainmode = strsep(&tmp, "-");
	ivopts = strsep(&tmp, "-");
	ivmode = strsep(&ivopts, ":");

	if (tmp)
M
Milan Broz 已提交
1073
		DMWARN("Ignoring unexpected additional cipher options");
L
Linus Torvalds 已提交
1074

1075 1076 1077 1078
	/*
	 * For compatibility with the original dm-crypt mapping format, if
	 * only the cipher name is supplied, use cbc-plain.
	 */
M
Milan Broz 已提交
1079
	if (!chainmode || (!strcmp(chainmode, "plain") && !ivmode)) {
L
Linus Torvalds 已提交
1080 1081 1082 1083
		chainmode = "cbc";
		ivmode = "plain";
	}

1084
	if (strcmp(chainmode, "ecb") && !ivmode) {
M
Milan Broz 已提交
1085 1086
		ti->error = "IV mechanism required";
		return -EINVAL;
L
Linus Torvalds 已提交
1087 1088
	}

M
Milan Broz 已提交
1089 1090 1091 1092 1093 1094 1095 1096 1097
	cipher_api = kmalloc(CRYPTO_MAX_ALG_NAME, GFP_KERNEL);
	if (!cipher_api)
		goto bad_mem;

	ret = snprintf(cipher_api, CRYPTO_MAX_ALG_NAME,
		       "%s(%s)", chainmode, cipher);
	if (ret < 0) {
		kfree(cipher_api);
		goto bad_mem;
L
Linus Torvalds 已提交
1098 1099
	}

M
Milan Broz 已提交
1100 1101
	/* Allocate cipher */
	cc->tfm = crypto_alloc_ablkcipher(cipher_api, 0, 0);
1102
	if (IS_ERR(cc->tfm)) {
M
Milan Broz 已提交
1103
		ret = PTR_ERR(cc->tfm);
1104
		ti->error = "Error allocating crypto tfm";
1105
		goto bad;
L
Linus Torvalds 已提交
1106 1107
	}

M
Milan Broz 已提交
1108 1109
	/* Initialize and set key */
	ret = crypt_set_key(cc, key);
1110
	if (ret < 0) {
1111
		ti->error = "Error decoding and setting key";
1112
		goto bad;
1113 1114
	}

M
Milan Broz 已提交
1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126
	/* Initialize IV */
	cc->iv_size = crypto_ablkcipher_ivsize(cc->tfm);
	if (cc->iv_size)
		/* at least a 64 bit sector number should fit in our buffer */
		cc->iv_size = max(cc->iv_size,
				  (unsigned int)(sizeof(u64) / sizeof(u8)));
	else if (ivmode) {
		DMWARN("Selected cipher does not support IVs");
		ivmode = NULL;
	}

	/* Choose ivmode, see comments at iv code. */
L
Linus Torvalds 已提交
1127 1128 1129 1130
	if (ivmode == NULL)
		cc->iv_gen_ops = NULL;
	else if (strcmp(ivmode, "plain") == 0)
		cc->iv_gen_ops = &crypt_iv_plain_ops;
M
Milan Broz 已提交
1131 1132
	else if (strcmp(ivmode, "plain64") == 0)
		cc->iv_gen_ops = &crypt_iv_plain64_ops;
L
Linus Torvalds 已提交
1133 1134
	else if (strcmp(ivmode, "essiv") == 0)
		cc->iv_gen_ops = &crypt_iv_essiv_ops;
1135 1136
	else if (strcmp(ivmode, "benbi") == 0)
		cc->iv_gen_ops = &crypt_iv_benbi_ops;
L
Ludwig Nussel 已提交
1137 1138
	else if (strcmp(ivmode, "null") == 0)
		cc->iv_gen_ops = &crypt_iv_null_ops;
L
Linus Torvalds 已提交
1139
	else {
M
Milan Broz 已提交
1140
		ret = -EINVAL;
1141
		ti->error = "Invalid IV mode";
1142
		goto bad;
L
Linus Torvalds 已提交
1143 1144
	}

1145 1146 1147 1148 1149 1150 1151 1152
	/* Allocate IV */
	if (cc->iv_gen_ops && cc->iv_gen_ops->ctr) {
		ret = cc->iv_gen_ops->ctr(cc, ti, ivopts);
		if (ret < 0) {
			ti->error = "Error creating IV";
			goto bad;
		}
	}
L
Linus Torvalds 已提交
1153

1154 1155 1156 1157 1158 1159 1160
	/* Initialize IV (set keys for ESSIV etc) */
	if (cc->iv_gen_ops && cc->iv_gen_ops->init) {
		ret = cc->iv_gen_ops->init(cc);
		if (ret < 0) {
			ti->error = "Error initialising IV";
			goto bad;
		}
1161 1162
	}

M
Milan Broz 已提交
1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186
	ret = 0;
bad:
	kfree(cipher_api);
	return ret;

bad_mem:
	ti->error = "Cannot allocate cipher strings";
	return -ENOMEM;
}

/*
 * Construct an encryption mapping:
 * <cipher> <key> <iv_offset> <dev_path> <start>
 */
static int crypt_ctr(struct dm_target *ti, unsigned int argc, char **argv)
{
	struct crypt_config *cc;
	unsigned int key_size;
	unsigned long long tmpll;
	int ret;

	if (argc != 5) {
		ti->error = "Not enough arguments";
		return -EINVAL;
L
Linus Torvalds 已提交
1187 1188
	}

M
Milan Broz 已提交
1189 1190 1191 1192 1193 1194 1195
	key_size = strlen(argv[1]) >> 1;

	cc = kzalloc(sizeof(*cc) + key_size * sizeof(u8), GFP_KERNEL);
	if (!cc) {
		ti->error = "Cannot allocate encryption context";
		return -ENOMEM;
	}
M
Milan Broz 已提交
1196
	cc->key_size = key_size;
M
Milan Broz 已提交
1197 1198 1199 1200 1201 1202

	ti->private = cc;
	ret = crypt_ctr_cipher(ti, argv[0], argv[1]);
	if (ret < 0)
		goto bad;

1203
	ret = -ENOMEM;
1204
	cc->io_pool = mempool_create_slab_pool(MIN_IOS, _crypt_io_pool);
L
Linus Torvalds 已提交
1205
	if (!cc->io_pool) {
1206
		ti->error = "Cannot allocate crypt io mempool";
1207
		goto bad;
L
Linus Torvalds 已提交
1208 1209
	}

M
Milan Broz 已提交
1210
	cc->dmreq_start = sizeof(struct ablkcipher_request);
1211
	cc->dmreq_start += crypto_ablkcipher_reqsize(cc->tfm);
M
Milan Broz 已提交
1212
	cc->dmreq_start = ALIGN(cc->dmreq_start, crypto_tfm_ctx_alignment());
1213
	cc->dmreq_start += crypto_ablkcipher_alignmask(cc->tfm) &
M
Milan Broz 已提交
1214
			   ~(crypto_tfm_ctx_alignment() - 1);
M
Milan Broz 已提交
1215 1216 1217 1218 1219

	cc->req_pool = mempool_create_kmalloc_pool(MIN_IOS, cc->dmreq_start +
			sizeof(struct dm_crypt_request) + cc->iv_size);
	if (!cc->req_pool) {
		ti->error = "Cannot allocate crypt request mempool";
1220
		goto bad;
M
Milan Broz 已提交
1221 1222 1223
	}
	cc->req = NULL;

1224
	cc->page_pool = mempool_create_page_pool(MIN_POOL_PAGES, 0);
L
Linus Torvalds 已提交
1225
	if (!cc->page_pool) {
1226
		ti->error = "Cannot allocate page mempool";
1227
		goto bad;
L
Linus Torvalds 已提交
1228 1229
	}

1230
	cc->bs = bioset_create(MIN_IOS, 0);
M
Milan Broz 已提交
1231 1232
	if (!cc->bs) {
		ti->error = "Cannot allocate crypt bioset";
1233
		goto bad;
M
Milan Broz 已提交
1234 1235
	}

1236
	ret = -EINVAL;
A
Andrew Morton 已提交
1237
	if (sscanf(argv[2], "%llu", &tmpll) != 1) {
1238
		ti->error = "Invalid iv_offset sector";
1239
		goto bad;
L
Linus Torvalds 已提交
1240
	}
A
Andrew Morton 已提交
1241
	cc->iv_offset = tmpll;
L
Linus Torvalds 已提交
1242

1243 1244 1245 1246 1247
	if (dm_get_device(ti, argv[3], dm_table_get_mode(ti->table), &cc->dev)) {
		ti->error = "Device lookup failed";
		goto bad;
	}

A
Andrew Morton 已提交
1248
	if (sscanf(argv[4], "%llu", &tmpll) != 1) {
1249
		ti->error = "Invalid device sector";
1250
		goto bad;
L
Linus Torvalds 已提交
1251
	}
A
Andrew Morton 已提交
1252
	cc->start = tmpll;
L
Linus Torvalds 已提交
1253

1254
	ret = -ENOMEM;
M
Milan Broz 已提交
1255 1256 1257
	cc->io_queue = create_singlethread_workqueue("kcryptd_io");
	if (!cc->io_queue) {
		ti->error = "Couldn't create kcryptd io queue";
1258
		goto bad;
M
Milan Broz 已提交
1259 1260 1261 1262
	}

	cc->crypt_queue = create_singlethread_workqueue("kcryptd");
	if (!cc->crypt_queue) {
1263
		ti->error = "Couldn't create kcryptd queue";
1264
		goto bad;
1265 1266
	}

M
Mikulas Patocka 已提交
1267
	ti->num_flush_requests = 1;
L
Linus Torvalds 已提交
1268 1269
	return 0;

1270 1271 1272
bad:
	crypt_dtr(ti);
	return ret;
L
Linus Torvalds 已提交
1273 1274 1275 1276 1277
}

static int crypt_map(struct dm_target *ti, struct bio *bio,
		     union map_info *map_context)
{
A
Alasdair G Kergon 已提交
1278
	struct dm_crypt_io *io;
M
Mikulas Patocka 已提交
1279 1280
	struct crypt_config *cc;

1281
	if (bio->bi_rw & REQ_FLUSH) {
M
Mikulas Patocka 已提交
1282 1283 1284 1285
		cc = ti->private;
		bio->bi_bdev = cc->dev->bdev;
		return DM_MAPIO_REMAPPED;
	}
L
Linus Torvalds 已提交
1286

1287
	io = crypt_io_alloc(ti, bio, dm_target_offset(ti, bio->bi_sector));
M
Milan Broz 已提交
1288 1289 1290 1291 1292

	if (bio_data_dir(io->base_bio) == READ)
		kcryptd_queue_io(io);
	else
		kcryptd_queue_crypt(io);
L
Linus Torvalds 已提交
1293

1294
	return DM_MAPIO_SUBMITTED;
L
Linus Torvalds 已提交
1295 1296 1297 1298 1299
}

static int crypt_status(struct dm_target *ti, status_type_t type,
			char *result, unsigned int maxlen)
{
M
Milan Broz 已提交
1300
	struct crypt_config *cc = ti->private;
L
Linus Torvalds 已提交
1301 1302 1303 1304 1305 1306 1307 1308
	unsigned int sz = 0;

	switch (type) {
	case STATUSTYPE_INFO:
		result[0] = '\0';
		break;

	case STATUSTYPE_TABLE:
1309
		DMEMIT("%s ", cc->cipher_string);
L
Linus Torvalds 已提交
1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322

		if (cc->key_size > 0) {
			if ((maxlen - sz) < ((cc->key_size << 1) + 1))
				return -ENOMEM;

			crypt_encode_key(result + sz, cc->key, cc->key_size);
			sz += cc->key_size << 1;
		} else {
			if (sz >= maxlen)
				return -ENOMEM;
			result[sz++] = '-';
		}

A
Andrew Morton 已提交
1323 1324
		DMEMIT(" %llu %s %llu", (unsigned long long)cc->iv_offset,
				cc->dev->name, (unsigned long long)cc->start);
L
Linus Torvalds 已提交
1325 1326 1327 1328 1329
		break;
	}
	return 0;
}

M
Milan Broz 已提交
1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362
static void crypt_postsuspend(struct dm_target *ti)
{
	struct crypt_config *cc = ti->private;

	set_bit(DM_CRYPT_SUSPENDED, &cc->flags);
}

static int crypt_preresume(struct dm_target *ti)
{
	struct crypt_config *cc = ti->private;

	if (!test_bit(DM_CRYPT_KEY_VALID, &cc->flags)) {
		DMERR("aborting resume - crypt key is not set.");
		return -EAGAIN;
	}

	return 0;
}

static void crypt_resume(struct dm_target *ti)
{
	struct crypt_config *cc = ti->private;

	clear_bit(DM_CRYPT_SUSPENDED, &cc->flags);
}

/* Message interface
 *	key set <key>
 *	key wipe
 */
static int crypt_message(struct dm_target *ti, unsigned argc, char **argv)
{
	struct crypt_config *cc = ti->private;
1363
	int ret = -EINVAL;
M
Milan Broz 已提交
1364 1365 1366 1367 1368 1369 1370 1371 1372

	if (argc < 2)
		goto error;

	if (!strnicmp(argv[0], MESG_STR("key"))) {
		if (!test_bit(DM_CRYPT_SUSPENDED, &cc->flags)) {
			DMWARN("not suspended during key manipulation.");
			return -EINVAL;
		}
1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386
		if (argc == 3 && !strnicmp(argv[1], MESG_STR("set"))) {
			ret = crypt_set_key(cc, argv[2]);
			if (ret)
				return ret;
			if (cc->iv_gen_ops && cc->iv_gen_ops->init)
				ret = cc->iv_gen_ops->init(cc);
			return ret;
		}
		if (argc == 2 && !strnicmp(argv[1], MESG_STR("wipe"))) {
			if (cc->iv_gen_ops && cc->iv_gen_ops->wipe) {
				ret = cc->iv_gen_ops->wipe(cc);
				if (ret)
					return ret;
			}
M
Milan Broz 已提交
1387
			return crypt_wipe_key(cc);
1388
		}
M
Milan Broz 已提交
1389 1390 1391 1392 1393 1394 1395
	}

error:
	DMWARN("unrecognised message received.");
	return -EINVAL;
}

M
Milan Broz 已提交
1396 1397 1398 1399 1400 1401 1402 1403 1404 1405
static int crypt_merge(struct dm_target *ti, struct bvec_merge_data *bvm,
		       struct bio_vec *biovec, int max_size)
{
	struct crypt_config *cc = ti->private;
	struct request_queue *q = bdev_get_queue(cc->dev->bdev);

	if (!q->merge_bvec_fn)
		return max_size;

	bvm->bi_bdev = cc->dev->bdev;
1406
	bvm->bi_sector = cc->start + dm_target_offset(ti, bvm->bi_sector);
M
Milan Broz 已提交
1407 1408 1409 1410

	return min(max_size, q->merge_bvec_fn(q, bvm, biovec));
}

1411 1412 1413 1414 1415
static int crypt_iterate_devices(struct dm_target *ti,
				 iterate_devices_callout_fn fn, void *data)
{
	struct crypt_config *cc = ti->private;

1416
	return fn(ti, cc->dev, cc->start, ti->len, data);
1417 1418
}

L
Linus Torvalds 已提交
1419 1420
static struct target_type crypt_target = {
	.name   = "crypt",
1421
	.version = {1, 8, 0},
L
Linus Torvalds 已提交
1422 1423 1424 1425 1426
	.module = THIS_MODULE,
	.ctr    = crypt_ctr,
	.dtr    = crypt_dtr,
	.map    = crypt_map,
	.status = crypt_status,
M
Milan Broz 已提交
1427 1428 1429 1430
	.postsuspend = crypt_postsuspend,
	.preresume = crypt_preresume,
	.resume = crypt_resume,
	.message = crypt_message,
M
Milan Broz 已提交
1431
	.merge  = crypt_merge,
1432
	.iterate_devices = crypt_iterate_devices,
L
Linus Torvalds 已提交
1433 1434 1435 1436 1437 1438
};

static int __init dm_crypt_init(void)
{
	int r;

A
Alasdair G Kergon 已提交
1439
	_crypt_io_pool = KMEM_CACHE(dm_crypt_io, 0);
L
Linus Torvalds 已提交
1440 1441 1442 1443 1444
	if (!_crypt_io_pool)
		return -ENOMEM;

	r = dm_register_target(&crypt_target);
	if (r < 0) {
1445
		DMERR("register failed %d", r);
1446
		kmem_cache_destroy(_crypt_io_pool);
L
Linus Torvalds 已提交
1447 1448 1449 1450 1451 1452 1453
	}

	return r;
}

static void __exit dm_crypt_exit(void)
{
1454
	dm_unregister_target(&crypt_target);
L
Linus Torvalds 已提交
1455 1456 1457 1458 1459 1460 1461 1462 1463
	kmem_cache_destroy(_crypt_io_pool);
}

module_init(dm_crypt_init);
module_exit(dm_crypt_exit);

MODULE_AUTHOR("Christophe Saout <christophe@saout.de>");
MODULE_DESCRIPTION(DM_NAME " target for transparent encryption / decryption");
MODULE_LICENSE("GPL");