dm-crypt.c 38.2 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3
/*
 * Copyright (C) 2003 Christophe Saout <christophe@saout.de>
 * Copyright (C) 2004 Clemens Fruhwirth <clemens@endorphin.org>
4
 * Copyright (C) 2006-2009 Red Hat, Inc. All rights reserved.
L
Linus Torvalds 已提交
5 6 7 8
 *
 * This file is released under the GPL.
 */

M
Milan Broz 已提交
9
#include <linux/completion.h>
10
#include <linux/err.h>
L
Linus Torvalds 已提交
11 12 13 14 15 16 17 18 19
#include <linux/module.h>
#include <linux/init.h>
#include <linux/kernel.h>
#include <linux/bio.h>
#include <linux/blkdev.h>
#include <linux/mempool.h>
#include <linux/slab.h>
#include <linux/crypto.h>
#include <linux/workqueue.h>
20
#include <linux/backing-dev.h>
A
Andi Kleen 已提交
21
#include <linux/percpu.h>
L
Linus Torvalds 已提交
22
#include <asm/atomic.h>
23
#include <linux/scatterlist.h>
L
Linus Torvalds 已提交
24
#include <asm/page.h>
25
#include <asm/unaligned.h>
L
Linus Torvalds 已提交
26

27
#include <linux/device-mapper.h>
L
Linus Torvalds 已提交
28

29
#define DM_MSG_PREFIX "crypt"
M
Milan Broz 已提交
30
#define MESG_STR(x) x, sizeof(x)
L
Linus Torvalds 已提交
31 32 33 34 35

/*
 * context holding the current state of a multi-part conversion
 */
struct convert_context {
M
Milan Broz 已提交
36
	struct completion restart;
L
Linus Torvalds 已提交
37 38 39 40 41 42 43
	struct bio *bio_in;
	struct bio *bio_out;
	unsigned int offset_in;
	unsigned int offset_out;
	unsigned int idx_in;
	unsigned int idx_out;
	sector_t sector;
M
Milan Broz 已提交
44
	atomic_t pending;
L
Linus Torvalds 已提交
45 46
};

47 48 49 50 51 52 53 54 55 56 57 58
/*
 * per bio private data
 */
struct dm_crypt_io {
	struct dm_target *target;
	struct bio *base_bio;
	struct work_struct work;

	struct convert_context ctx;

	atomic_t pending;
	int error;
59
	sector_t sector;
M
Milan Broz 已提交
60
	struct dm_crypt_io *base_io;
61 62
};

63
struct dm_crypt_request {
64
	struct convert_context *ctx;
65 66
	struct scatterlist sg_in;
	struct scatterlist sg_out;
67
	sector_t iv_sector;
68 69
};

L
Linus Torvalds 已提交
70 71 72 73
struct crypt_config;

struct crypt_iv_operations {
	int (*ctr)(struct crypt_config *cc, struct dm_target *ti,
M
Milan Broz 已提交
74
		   const char *opts);
L
Linus Torvalds 已提交
75
	void (*dtr)(struct crypt_config *cc);
76
	int (*init)(struct crypt_config *cc);
77
	int (*wipe)(struct crypt_config *cc);
78 79 80 81
	int (*generator)(struct crypt_config *cc, u8 *iv,
			 struct dm_crypt_request *dmreq);
	int (*post)(struct crypt_config *cc, u8 *iv,
		    struct dm_crypt_request *dmreq);
L
Linus Torvalds 已提交
82 83
};

84
struct iv_essiv_private {
85 86
	struct crypto_hash *hash_tfm;
	u8 *salt;
87 88 89 90 91 92
};

struct iv_benbi_private {
	int shift;
};

L
Linus Torvalds 已提交
93 94 95 96
/*
 * Crypt: maps a linear range of a block device
 * and encrypts / decrypts at the same time.
 */
M
Milan Broz 已提交
97
enum flags { DM_CRYPT_SUSPENDED, DM_CRYPT_KEY_VALID };
A
Andi Kleen 已提交
98 99 100 101 102 103 104 105

/*
 * Duplicated per-CPU state for cipher.
 */
struct crypt_cpu {
	struct ablkcipher_request *req;
	/* ESSIV: struct crypto_cipher *essiv_tfm */
	void *iv_private;
M
Milan Broz 已提交
106
	struct crypto_ablkcipher *tfms[0];
A
Andi Kleen 已提交
107 108 109 110 111 112
};

/*
 * The fields in here must be read only after initialization,
 * changing state should be in crypt_cpu.
 */
L
Linus Torvalds 已提交
113 114 115 116 117
struct crypt_config {
	struct dm_dev *dev;
	sector_t start;

	/*
M
Milan Broz 已提交
118 119
	 * pool for per bio private data, crypto requests and
	 * encryption requeusts/buffer pages
L
Linus Torvalds 已提交
120 121
	 */
	mempool_t *io_pool;
M
Milan Broz 已提交
122
	mempool_t *req_pool;
L
Linus Torvalds 已提交
123
	mempool_t *page_pool;
M
Milan Broz 已提交
124
	struct bio_set *bs;
L
Linus Torvalds 已提交
125

M
Milan Broz 已提交
126 127
	struct workqueue_struct *io_queue;
	struct workqueue_struct *crypt_queue;
M
Milan Broz 已提交
128

M
Milan Broz 已提交
129
	char *cipher;
130
	char *cipher_string;
M
Milan Broz 已提交
131

L
Linus Torvalds 已提交
132
	struct crypt_iv_operations *iv_gen_ops;
133
	union {
134 135
		struct iv_essiv_private essiv;
		struct iv_benbi_private benbi;
136
	} iv_gen_private;
L
Linus Torvalds 已提交
137 138 139
	sector_t iv_offset;
	unsigned int iv_size;

A
Andi Kleen 已提交
140 141 142 143 144
	/*
	 * Duplicated per cpu state. Access through
	 * per_cpu_ptr() only.
	 */
	struct crypt_cpu __percpu *cpu;
M
Milan Broz 已提交
145
	unsigned tfms_count;
A
Andi Kleen 已提交
146

M
Milan Broz 已提交
147 148 149 150 151 152 153 154 155 156 157 158 159 160 161
	/*
	 * Layout of each crypto request:
	 *
	 *   struct ablkcipher_request
	 *      context
	 *      padding
	 *   struct dm_crypt_request
	 *      padding
	 *   IV
	 *
	 * The padding is added so that dm_crypt_request and the IV are
	 * correctly aligned.
	 */
	unsigned int dmreq_start;

M
Milan Broz 已提交
162
	unsigned long flags;
L
Linus Torvalds 已提交
163
	unsigned int key_size;
M
Milan Broz 已提交
164
	unsigned int key_parts;
L
Linus Torvalds 已提交
165 166 167
	u8 key[0];
};

M
Milan Broz 已提交
168
#define MIN_IOS        16
L
Linus Torvalds 已提交
169 170 171
#define MIN_POOL_PAGES 32
#define MIN_BIO_PAGES  8

172
static struct kmem_cache *_crypt_io_pool;
L
Linus Torvalds 已提交
173

A
Alasdair G Kergon 已提交
174
static void clone_init(struct dm_crypt_io *, struct bio *);
175
static void kcryptd_queue_crypt(struct dm_crypt_io *io);
176
static u8 *iv_of_dmreq(struct crypt_config *cc, struct dm_crypt_request *dmreq);
O
Olaf Kirch 已提交
177

A
Andi Kleen 已提交
178 179 180 181 182 183 184 185 186 187
static struct crypt_cpu *this_crypt_config(struct crypt_config *cc)
{
	return this_cpu_ptr(cc->cpu);
}

/*
 * Use this to access cipher attributes that are the same for each CPU.
 */
static struct crypto_ablkcipher *any_tfm(struct crypt_config *cc)
{
M
Milan Broz 已提交
188
	return __this_cpu_ptr(cc->cpu)->tfms[0];
A
Andi Kleen 已提交
189 190
}

L
Linus Torvalds 已提交
191 192 193
/*
 * Different IV generation algorithms:
 *
194
 * plain: the initial vector is the 32-bit little-endian version of the sector
195
 *        number, padded with zeros if necessary.
L
Linus Torvalds 已提交
196
 *
M
Milan Broz 已提交
197 198 199
 * plain64: the initial vector is the 64-bit little-endian version of the sector
 *        number, padded with zeros if necessary.
 *
200 201 202
 * essiv: "encrypted sector|salt initial vector", the sector number is
 *        encrypted with the bulk cipher using a salt as key. The salt
 *        should be derived from the bulk cipher's key via hashing.
L
Linus Torvalds 已提交
203
 *
204 205 206
 * benbi: the 64-bit "big-endian 'narrow block'-count", starting at 1
 *        (needed for LRW-32-AES and possible other narrow block modes)
 *
L
Ludwig Nussel 已提交
207 208 209
 * null: the initial vector is always zero.  Provides compatibility with
 *       obsolete loop_fish2 devices.  Do not use for new devices.
 *
L
Linus Torvalds 已提交
210 211 212 213
 * plumb: unimplemented, see:
 * http://article.gmane.org/gmane.linux.kernel.device-mapper.dm-crypt/454
 */

214 215
static int crypt_iv_plain_gen(struct crypt_config *cc, u8 *iv,
			      struct dm_crypt_request *dmreq)
L
Linus Torvalds 已提交
216 217
{
	memset(iv, 0, cc->iv_size);
218
	*(u32 *)iv = cpu_to_le32(dmreq->iv_sector & 0xffffffff);
L
Linus Torvalds 已提交
219 220 221 222

	return 0;
}

M
Milan Broz 已提交
223
static int crypt_iv_plain64_gen(struct crypt_config *cc, u8 *iv,
224
				struct dm_crypt_request *dmreq)
M
Milan Broz 已提交
225 226
{
	memset(iv, 0, cc->iv_size);
227
	*(u64 *)iv = cpu_to_le64(dmreq->iv_sector);
M
Milan Broz 已提交
228 229 230 231

	return 0;
}

232 233 234 235 236 237
/* Initialise ESSIV - compute salt but no local memory allocations */
static int crypt_iv_essiv_init(struct crypt_config *cc)
{
	struct iv_essiv_private *essiv = &cc->iv_gen_private.essiv;
	struct hash_desc desc;
	struct scatterlist sg;
A
Andi Kleen 已提交
238 239
	struct crypto_cipher *essiv_tfm;
	int err, cpu;
240 241 242 243 244 245 246 247 248

	sg_init_one(&sg, cc->key, cc->key_size);
	desc.tfm = essiv->hash_tfm;
	desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;

	err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt);
	if (err)
		return err;

A
Andi Kleen 已提交
249 250 251 252
	for_each_possible_cpu(cpu) {
		essiv_tfm = per_cpu_ptr(cc->cpu, cpu)->iv_private,

		err = crypto_cipher_setkey(essiv_tfm, essiv->salt,
253
				    crypto_hash_digestsize(essiv->hash_tfm));
A
Andi Kleen 已提交
254 255 256 257 258
		if (err)
			return err;
	}

	return 0;
259 260
}

261 262 263 264 265
/* Wipe salt and reset key derived from volume key */
static int crypt_iv_essiv_wipe(struct crypt_config *cc)
{
	struct iv_essiv_private *essiv = &cc->iv_gen_private.essiv;
	unsigned salt_size = crypto_hash_digestsize(essiv->hash_tfm);
A
Andi Kleen 已提交
266 267
	struct crypto_cipher *essiv_tfm;
	int cpu, r, err = 0;
268 269 270

	memset(essiv->salt, 0, salt_size);

A
Andi Kleen 已提交
271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311
	for_each_possible_cpu(cpu) {
		essiv_tfm = per_cpu_ptr(cc->cpu, cpu)->iv_private;
		r = crypto_cipher_setkey(essiv_tfm, essiv->salt, salt_size);
		if (r)
			err = r;
	}

	return err;
}

/* Set up per cpu cipher state */
static struct crypto_cipher *setup_essiv_cpu(struct crypt_config *cc,
					     struct dm_target *ti,
					     u8 *salt, unsigned saltsize)
{
	struct crypto_cipher *essiv_tfm;
	int err;

	/* Setup the essiv_tfm with the given salt */
	essiv_tfm = crypto_alloc_cipher(cc->cipher, 0, CRYPTO_ALG_ASYNC);
	if (IS_ERR(essiv_tfm)) {
		ti->error = "Error allocating crypto tfm for ESSIV";
		return essiv_tfm;
	}

	if (crypto_cipher_blocksize(essiv_tfm) !=
	    crypto_ablkcipher_ivsize(any_tfm(cc))) {
		ti->error = "Block size of ESSIV cipher does "
			    "not match IV size of block cipher";
		crypto_free_cipher(essiv_tfm);
		return ERR_PTR(-EINVAL);
	}

	err = crypto_cipher_setkey(essiv_tfm, salt, saltsize);
	if (err) {
		ti->error = "Failed to set key for ESSIV cipher";
		crypto_free_cipher(essiv_tfm);
		return ERR_PTR(err);
	}

	return essiv_tfm;
312 313
}

314 315
static void crypt_iv_essiv_dtr(struct crypt_config *cc)
{
A
Andi Kleen 已提交
316 317 318
	int cpu;
	struct crypt_cpu *cpu_cc;
	struct crypto_cipher *essiv_tfm;
319 320
	struct iv_essiv_private *essiv = &cc->iv_gen_private.essiv;

321 322 323 324 325
	crypto_free_hash(essiv->hash_tfm);
	essiv->hash_tfm = NULL;

	kzfree(essiv->salt);
	essiv->salt = NULL;
A
Andi Kleen 已提交
326 327 328 329 330 331 332 333 334 335

	for_each_possible_cpu(cpu) {
		cpu_cc = per_cpu_ptr(cc->cpu, cpu);
		essiv_tfm = cpu_cc->iv_private;

		if (essiv_tfm)
			crypto_free_cipher(essiv_tfm);

		cpu_cc->iv_private = NULL;
	}
336 337
}

L
Linus Torvalds 已提交
338
static int crypt_iv_essiv_ctr(struct crypt_config *cc, struct dm_target *ti,
M
Milan Broz 已提交
339
			      const char *opts)
L
Linus Torvalds 已提交
340
{
341 342 343
	struct crypto_cipher *essiv_tfm = NULL;
	struct crypto_hash *hash_tfm = NULL;
	u8 *salt = NULL;
A
Andi Kleen 已提交
344
	int err, cpu;
L
Linus Torvalds 已提交
345

346
	if (!opts) {
347
		ti->error = "Digest algorithm missing for ESSIV mode";
L
Linus Torvalds 已提交
348 349 350
		return -EINVAL;
	}

351
	/* Allocate hash algorithm */
352 353
	hash_tfm = crypto_alloc_hash(opts, 0, CRYPTO_ALG_ASYNC);
	if (IS_ERR(hash_tfm)) {
354
		ti->error = "Error initializing ESSIV hash";
355 356
		err = PTR_ERR(hash_tfm);
		goto bad;
L
Linus Torvalds 已提交
357 358
	}

359
	salt = kzalloc(crypto_hash_digestsize(hash_tfm), GFP_KERNEL);
360
	if (!salt) {
361
		ti->error = "Error kmallocing salt storage in ESSIV";
362 363
		err = -ENOMEM;
		goto bad;
L
Linus Torvalds 已提交
364 365
	}

366 367 368
	cc->iv_gen_private.essiv.salt = salt;
	cc->iv_gen_private.essiv.hash_tfm = hash_tfm;

A
Andi Kleen 已提交
369 370 371 372 373 374 375 376 377 378
	for_each_possible_cpu(cpu) {
		essiv_tfm = setup_essiv_cpu(cc, ti, salt,
					crypto_hash_digestsize(hash_tfm));
		if (IS_ERR(essiv_tfm)) {
			crypt_iv_essiv_dtr(cc);
			return PTR_ERR(essiv_tfm);
		}
		per_cpu_ptr(cc->cpu, cpu)->iv_private = essiv_tfm;
	}

L
Linus Torvalds 已提交
379
	return 0;
380 381 382 383

bad:
	if (hash_tfm && !IS_ERR(hash_tfm))
		crypto_free_hash(hash_tfm);
384
	kfree(salt);
385
	return err;
L
Linus Torvalds 已提交
386 387
}

388 389
static int crypt_iv_essiv_gen(struct crypt_config *cc, u8 *iv,
			      struct dm_crypt_request *dmreq)
L
Linus Torvalds 已提交
390
{
A
Andi Kleen 已提交
391 392
	struct crypto_cipher *essiv_tfm = this_crypt_config(cc)->iv_private;

L
Linus Torvalds 已提交
393
	memset(iv, 0, cc->iv_size);
394
	*(u64 *)iv = cpu_to_le64(dmreq->iv_sector);
A
Andi Kleen 已提交
395 396
	crypto_cipher_encrypt_one(essiv_tfm, iv, iv);

L
Linus Torvalds 已提交
397 398 399
	return 0;
}

400 401 402
static int crypt_iv_benbi_ctr(struct crypt_config *cc, struct dm_target *ti,
			      const char *opts)
{
A
Andi Kleen 已提交
403
	unsigned bs = crypto_ablkcipher_blocksize(any_tfm(cc));
404
	int log = ilog2(bs);
405 406 407 408 409 410 411 412 413 414 415 416 417 418

	/* we need to calculate how far we must shift the sector count
	 * to get the cipher block count, we use this shift in _gen */

	if (1 << log != bs) {
		ti->error = "cypher blocksize is not a power of 2";
		return -EINVAL;
	}

	if (log > 9) {
		ti->error = "cypher blocksize is > 512";
		return -EINVAL;
	}

419
	cc->iv_gen_private.benbi.shift = 9 - log;
420 421 422 423 424 425 426 427

	return 0;
}

static void crypt_iv_benbi_dtr(struct crypt_config *cc)
{
}

428 429
static int crypt_iv_benbi_gen(struct crypt_config *cc, u8 *iv,
			      struct dm_crypt_request *dmreq)
430
{
431 432
	__be64 val;

433
	memset(iv, 0, cc->iv_size - sizeof(u64)); /* rest is cleared below */
434

435
	val = cpu_to_be64(((u64)dmreq->iv_sector << cc->iv_gen_private.benbi.shift) + 1);
436
	put_unaligned(val, (__be64 *)(iv + cc->iv_size - sizeof(u64)));
437

L
Linus Torvalds 已提交
438 439 440
	return 0;
}

441 442
static int crypt_iv_null_gen(struct crypt_config *cc, u8 *iv,
			     struct dm_crypt_request *dmreq)
L
Ludwig Nussel 已提交
443 444 445 446 447 448
{
	memset(iv, 0, cc->iv_size);

	return 0;
}

L
Linus Torvalds 已提交
449 450 451 452
static struct crypt_iv_operations crypt_iv_plain_ops = {
	.generator = crypt_iv_plain_gen
};

M
Milan Broz 已提交
453 454 455 456
static struct crypt_iv_operations crypt_iv_plain64_ops = {
	.generator = crypt_iv_plain64_gen
};

L
Linus Torvalds 已提交
457 458 459
static struct crypt_iv_operations crypt_iv_essiv_ops = {
	.ctr       = crypt_iv_essiv_ctr,
	.dtr       = crypt_iv_essiv_dtr,
460
	.init      = crypt_iv_essiv_init,
461
	.wipe      = crypt_iv_essiv_wipe,
L
Linus Torvalds 已提交
462 463 464
	.generator = crypt_iv_essiv_gen
};

465 466 467 468 469
static struct crypt_iv_operations crypt_iv_benbi_ops = {
	.ctr	   = crypt_iv_benbi_ctr,
	.dtr	   = crypt_iv_benbi_dtr,
	.generator = crypt_iv_benbi_gen
};
L
Linus Torvalds 已提交
470

L
Ludwig Nussel 已提交
471 472 473 474
static struct crypt_iv_operations crypt_iv_null_ops = {
	.generator = crypt_iv_null_gen
};

M
Milan Broz 已提交
475 476 477
static void crypt_convert_init(struct crypt_config *cc,
			       struct convert_context *ctx,
			       struct bio *bio_out, struct bio *bio_in,
478
			       sector_t sector)
L
Linus Torvalds 已提交
479 480 481 482 483 484 485 486
{
	ctx->bio_in = bio_in;
	ctx->bio_out = bio_out;
	ctx->offset_in = 0;
	ctx->offset_out = 0;
	ctx->idx_in = bio_in ? bio_in->bi_idx : 0;
	ctx->idx_out = bio_out ? bio_out->bi_idx : 0;
	ctx->sector = sector + cc->iv_offset;
M
Milan Broz 已提交
487
	init_completion(&ctx->restart);
L
Linus Torvalds 已提交
488 489
}

490 491 492 493 494 495 496 497 498 499 500 501
static struct dm_crypt_request *dmreq_of_req(struct crypt_config *cc,
					     struct ablkcipher_request *req)
{
	return (struct dm_crypt_request *)((char *)req + cc->dmreq_start);
}

static struct ablkcipher_request *req_of_dmreq(struct crypt_config *cc,
					       struct dm_crypt_request *dmreq)
{
	return (struct ablkcipher_request *)((char *)dmreq - cc->dmreq_start);
}

502 503 504 505 506 507 508
static u8 *iv_of_dmreq(struct crypt_config *cc,
		       struct dm_crypt_request *dmreq)
{
	return (u8 *)ALIGN((unsigned long)(dmreq + 1),
		crypto_ablkcipher_alignmask(any_tfm(cc)) + 1);
}

509
static int crypt_convert_block(struct crypt_config *cc,
M
Milan Broz 已提交
510 511
			       struct convert_context *ctx,
			       struct ablkcipher_request *req)
512 513 514
{
	struct bio_vec *bv_in = bio_iovec_idx(ctx->bio_in, ctx->idx_in);
	struct bio_vec *bv_out = bio_iovec_idx(ctx->bio_out, ctx->idx_out);
M
Milan Broz 已提交
515 516 517 518
	struct dm_crypt_request *dmreq;
	u8 *iv;
	int r = 0;

519
	dmreq = dmreq_of_req(cc, req);
520
	iv = iv_of_dmreq(cc, dmreq);
521

522
	dmreq->iv_sector = ctx->sector;
523
	dmreq->ctx = ctx;
M
Milan Broz 已提交
524 525
	sg_init_table(&dmreq->sg_in, 1);
	sg_set_page(&dmreq->sg_in, bv_in->bv_page, 1 << SECTOR_SHIFT,
526 527
		    bv_in->bv_offset + ctx->offset_in);

M
Milan Broz 已提交
528 529
	sg_init_table(&dmreq->sg_out, 1);
	sg_set_page(&dmreq->sg_out, bv_out->bv_page, 1 << SECTOR_SHIFT,
530 531 532 533 534 535 536 537 538 539 540 541 542 543
		    bv_out->bv_offset + ctx->offset_out);

	ctx->offset_in += 1 << SECTOR_SHIFT;
	if (ctx->offset_in >= bv_in->bv_len) {
		ctx->offset_in = 0;
		ctx->idx_in++;
	}

	ctx->offset_out += 1 << SECTOR_SHIFT;
	if (ctx->offset_out >= bv_out->bv_len) {
		ctx->offset_out = 0;
		ctx->idx_out++;
	}

M
Milan Broz 已提交
544
	if (cc->iv_gen_ops) {
545
		r = cc->iv_gen_ops->generator(cc, iv, dmreq);
M
Milan Broz 已提交
546 547 548 549 550 551 552 553 554 555 556 557
		if (r < 0)
			return r;
	}

	ablkcipher_request_set_crypt(req, &dmreq->sg_in, &dmreq->sg_out,
				     1 << SECTOR_SHIFT, iv);

	if (bio_data_dir(ctx->bio_in) == WRITE)
		r = crypto_ablkcipher_encrypt(req);
	else
		r = crypto_ablkcipher_decrypt(req);

558 559 560
	if (!r && cc->iv_gen_ops && cc->iv_gen_ops->post)
		r = cc->iv_gen_ops->post(cc, iv, dmreq);

M
Milan Broz 已提交
561
	return r;
562 563
}

M
Milan Broz 已提交
564 565
static void kcryptd_async_done(struct crypto_async_request *async_req,
			       int error);
A
Andi Kleen 已提交
566

M
Milan Broz 已提交
567 568 569
static void crypt_alloc_req(struct crypt_config *cc,
			    struct convert_context *ctx)
{
A
Andi Kleen 已提交
570
	struct crypt_cpu *this_cc = this_crypt_config(cc);
M
Milan Broz 已提交
571
	unsigned key_index = ctx->sector & (cc->tfms_count - 1);
A
Andi Kleen 已提交
572 573 574 575

	if (!this_cc->req)
		this_cc->req = mempool_alloc(cc->req_pool, GFP_NOIO);

M
Milan Broz 已提交
576
	ablkcipher_request_set_tfm(this_cc->req, this_cc->tfms[key_index]);
A
Andi Kleen 已提交
577 578 579
	ablkcipher_request_set_callback(this_cc->req,
	    CRYPTO_TFM_REQ_MAY_BACKLOG | CRYPTO_TFM_REQ_MAY_SLEEP,
	    kcryptd_async_done, dmreq_of_req(cc, this_cc->req));
M
Milan Broz 已提交
580 581
}

L
Linus Torvalds 已提交
582 583 584 585
/*
 * Encrypt / decrypt data from one bio to another one (can be the same one)
 */
static int crypt_convert(struct crypt_config *cc,
M
Milan Broz 已提交
586
			 struct convert_context *ctx)
L
Linus Torvalds 已提交
587
{
A
Andi Kleen 已提交
588
	struct crypt_cpu *this_cc = this_crypt_config(cc);
M
Milan Broz 已提交
589
	int r;
L
Linus Torvalds 已提交
590

M
Milan Broz 已提交
591 592
	atomic_set(&ctx->pending, 1);

L
Linus Torvalds 已提交
593 594 595
	while(ctx->idx_in < ctx->bio_in->bi_vcnt &&
	      ctx->idx_out < ctx->bio_out->bi_vcnt) {

M
Milan Broz 已提交
596 597
		crypt_alloc_req(cc, ctx);

M
Milan Broz 已提交
598 599
		atomic_inc(&ctx->pending);

A
Andi Kleen 已提交
600
		r = crypt_convert_block(cc, ctx, this_cc->req);
M
Milan Broz 已提交
601 602

		switch (r) {
M
Milan Broz 已提交
603
		/* async */
M
Milan Broz 已提交
604 605 606 607 608
		case -EBUSY:
			wait_for_completion(&ctx->restart);
			INIT_COMPLETION(ctx->restart);
			/* fall through*/
		case -EINPROGRESS:
A
Andi Kleen 已提交
609
			this_cc->req = NULL;
M
Milan Broz 已提交
610 611 612 613
			ctx->sector++;
			continue;

		/* sync */
M
Milan Broz 已提交
614
		case 0:
M
Milan Broz 已提交
615
			atomic_dec(&ctx->pending);
M
Milan Broz 已提交
616
			ctx->sector++;
M
Milan Broz 已提交
617
			cond_resched();
M
Milan Broz 已提交
618 619
			continue;

M
Milan Broz 已提交
620 621 622 623 624
		/* error */
		default:
			atomic_dec(&ctx->pending);
			return r;
		}
L
Linus Torvalds 已提交
625 626
	}

M
Milan Broz 已提交
627
	return 0;
L
Linus Torvalds 已提交
628 629
}

M
Milan Broz 已提交
630 631
static void dm_crypt_bio_destructor(struct bio *bio)
{
A
Alasdair G Kergon 已提交
632
	struct dm_crypt_io *io = bio->bi_private;
M
Milan Broz 已提交
633 634 635
	struct crypt_config *cc = io->target->private;

	bio_free(bio, cc->bs);
M
Milan Broz 已提交
636
}
M
Milan Broz 已提交
637

L
Linus Torvalds 已提交
638 639 640
/*
 * Generate a new unfragmented bio with the given size
 * This should never violate the device limitations
641 642
 * May return a smaller bio when running out of pages, indicated by
 * *out_of_pages set to 1.
L
Linus Torvalds 已提交
643
 */
644 645
static struct bio *crypt_alloc_buffer(struct dm_crypt_io *io, unsigned size,
				      unsigned *out_of_pages)
L
Linus Torvalds 已提交
646
{
O
Olaf Kirch 已提交
647
	struct crypt_config *cc = io->target->private;
648
	struct bio *clone;
L
Linus Torvalds 已提交
649
	unsigned int nr_iovecs = (size + PAGE_SIZE - 1) >> PAGE_SHIFT;
650
	gfp_t gfp_mask = GFP_NOIO | __GFP_HIGHMEM;
M
Milan Broz 已提交
651 652
	unsigned i, len;
	struct page *page;
L
Linus Torvalds 已提交
653

O
Olaf Kirch 已提交
654
	clone = bio_alloc_bioset(GFP_NOIO, nr_iovecs, cc->bs);
655
	if (!clone)
L
Linus Torvalds 已提交
656 657
		return NULL;

O
Olaf Kirch 已提交
658
	clone_init(io, clone);
659
	*out_of_pages = 0;
M
Milan Broz 已提交
660

661
	for (i = 0; i < nr_iovecs; i++) {
M
Milan Broz 已提交
662
		page = mempool_alloc(cc->page_pool, gfp_mask);
663 664
		if (!page) {
			*out_of_pages = 1;
L
Linus Torvalds 已提交
665
			break;
666
		}
L
Linus Torvalds 已提交
667 668 669 670 671 672

		/*
		 * if additional pages cannot be allocated without waiting,
		 * return a partially allocated bio, the caller will then try
		 * to allocate additional bios while submitting this partial bio
		 */
673
		if (i == (MIN_BIO_PAGES - 1))
L
Linus Torvalds 已提交
674 675
			gfp_mask = (gfp_mask | __GFP_NOWARN) & ~__GFP_WAIT;

M
Milan Broz 已提交
676 677 678 679 680 681
		len = (size > PAGE_SIZE) ? PAGE_SIZE : size;

		if (!bio_add_page(clone, page, len, 0)) {
			mempool_free(page, cc->page_pool);
			break;
		}
L
Linus Torvalds 已提交
682

M
Milan Broz 已提交
683
		size -= len;
L
Linus Torvalds 已提交
684 685
	}

686 687
	if (!clone->bi_size) {
		bio_put(clone);
L
Linus Torvalds 已提交
688 689 690
		return NULL;
	}

691
	return clone;
L
Linus Torvalds 已提交
692 693
}

N
Neil Brown 已提交
694
static void crypt_free_buffer_pages(struct crypt_config *cc, struct bio *clone)
L
Linus Torvalds 已提交
695
{
N
Neil Brown 已提交
696
	unsigned int i;
L
Linus Torvalds 已提交
697 698
	struct bio_vec *bv;

N
Neil Brown 已提交
699
	for (i = 0; i < clone->bi_vcnt; i++) {
700
		bv = bio_iovec_idx(clone, i);
L
Linus Torvalds 已提交
701 702 703 704 705 706
		BUG_ON(!bv->bv_page);
		mempool_free(bv->bv_page, cc->page_pool);
		bv->bv_page = NULL;
	}
}

M
Milan Broz 已提交
707 708 709 710 711 712 713 714 715 716 717
static struct dm_crypt_io *crypt_io_alloc(struct dm_target *ti,
					  struct bio *bio, sector_t sector)
{
	struct crypt_config *cc = ti->private;
	struct dm_crypt_io *io;

	io = mempool_alloc(cc->io_pool, GFP_NOIO);
	io->target = ti;
	io->base_bio = bio;
	io->sector = sector;
	io->error = 0;
M
Milan Broz 已提交
718
	io->base_io = NULL;
M
Milan Broz 已提交
719 720 721 722 723
	atomic_set(&io->pending, 0);

	return io;
}

M
Milan Broz 已提交
724 725 726 727 728
static void crypt_inc_pending(struct dm_crypt_io *io)
{
	atomic_inc(&io->pending);
}

L
Linus Torvalds 已提交
729 730 731
/*
 * One of the bios was finished. Check for completion of
 * the whole request and correctly clean up the buffer.
M
Milan Broz 已提交
732
 * If base_io is set, wait for the last fragment to complete.
L
Linus Torvalds 已提交
733
 */
734
static void crypt_dec_pending(struct dm_crypt_io *io)
L
Linus Torvalds 已提交
735
{
736
	struct crypt_config *cc = io->target->private;
737 738 739
	struct bio *base_bio = io->base_bio;
	struct dm_crypt_io *base_io = io->base_io;
	int error = io->error;
L
Linus Torvalds 已提交
740 741 742 743

	if (!atomic_dec_and_test(&io->pending))
		return;

744 745 746 747
	mempool_free(io, cc->io_pool);

	if (likely(!base_io))
		bio_endio(base_bio, error);
M
Milan Broz 已提交
748
	else {
749 750 751
		if (error && !base_io->error)
			base_io->error = error;
		crypt_dec_pending(base_io);
M
Milan Broz 已提交
752
	}
L
Linus Torvalds 已提交
753 754 755
}

/*
M
Milan Broz 已提交
756
 * kcryptd/kcryptd_io:
L
Linus Torvalds 已提交
757 758
 *
 * Needed because it would be very unwise to do decryption in an
759
 * interrupt context.
M
Milan Broz 已提交
760 761 762 763 764 765 766 767
 *
 * kcryptd performs the actual encryption or decryption.
 *
 * kcryptd_io performs the IO submission.
 *
 * They must be separated as otherwise the final stages could be
 * starved by new requests which can block in the first stages due
 * to memory allocation.
A
Andi Kleen 已提交
768 769 770
 *
 * The work is done per CPU global for all dm-crypt instances.
 * They should not depend on each other and do not block.
L
Linus Torvalds 已提交
771
 */
772
static void crypt_endio(struct bio *clone, int error)
773
{
A
Alasdair G Kergon 已提交
774
	struct dm_crypt_io *io = clone->bi_private;
775
	struct crypt_config *cc = io->target->private;
M
Milan Broz 已提交
776
	unsigned rw = bio_data_dir(clone);
777

M
Milan Broz 已提交
778 779 780
	if (unlikely(!bio_flagged(clone, BIO_UPTODATE) && !error))
		error = -EIO;

781
	/*
782
	 * free the processed pages
783
	 */
M
Milan Broz 已提交
784
	if (rw == WRITE)
N
Neil Brown 已提交
785
		crypt_free_buffer_pages(cc, clone);
786 787 788

	bio_put(clone);

M
Milan Broz 已提交
789 790 791 792
	if (rw == READ && !error) {
		kcryptd_queue_crypt(io);
		return;
	}
793 794 795 796 797

	if (unlikely(error))
		io->error = error;

	crypt_dec_pending(io);
798 799
}

A
Alasdair G Kergon 已提交
800
static void clone_init(struct dm_crypt_io *io, struct bio *clone)
801 802 803 804 805 806 807
{
	struct crypt_config *cc = io->target->private;

	clone->bi_private = io;
	clone->bi_end_io  = crypt_endio;
	clone->bi_bdev    = cc->dev->bdev;
	clone->bi_rw      = io->base_bio->bi_rw;
O
Olaf Kirch 已提交
808
	clone->bi_destructor = dm_crypt_bio_destructor;
809 810
}

811 812 813 814 815 816
static void kcryptd_unplug(struct crypt_config *cc)
{
	blk_unplug(bdev_get_queue(cc->dev->bdev));
}

static int kcryptd_io_read(struct dm_crypt_io *io, gfp_t gfp)
817 818 819 820
{
	struct crypt_config *cc = io->target->private;
	struct bio *base_bio = io->base_bio;
	struct bio *clone;
821

822 823 824 825 826
	/*
	 * The block layer might modify the bvec array, so always
	 * copy the required bvecs because we need the original
	 * one in order to decrypt the whole bio data *afterwards*.
	 */
827 828 829 830
	clone = bio_alloc_bioset(gfp, bio_segments(base_bio), cc->bs);
	if (!clone) {
		kcryptd_unplug(cc);
		return 1;
831
	}
832

833 834
	crypt_inc_pending(io);

835 836 837 838
	clone_init(io, clone);
	clone->bi_idx = 0;
	clone->bi_vcnt = bio_segments(base_bio);
	clone->bi_size = base_bio->bi_size;
839
	clone->bi_sector = cc->start + io->sector;
840 841 842
	memcpy(clone->bi_io_vec, bio_iovec(base_bio),
	       sizeof(struct bio_vec) * clone->bi_vcnt);

843
	generic_make_request(clone);
844
	return 0;
845 846
}

847 848
static void kcryptd_io_write(struct dm_crypt_io *io)
{
M
Milan Broz 已提交
849 850
	struct bio *clone = io->ctx.bio_out;
	generic_make_request(clone);
851 852
}

853 854 855 856
static void kcryptd_io(struct work_struct *work)
{
	struct dm_crypt_io *io = container_of(work, struct dm_crypt_io, work);

857 858 859 860 861 862
	if (bio_data_dir(io->base_bio) == READ) {
		crypt_inc_pending(io);
		if (kcryptd_io_read(io, GFP_NOIO))
			io->error = -ENOMEM;
		crypt_dec_pending(io);
	} else
863 864 865 866 867 868 869 870 871 872 873
		kcryptd_io_write(io);
}

static void kcryptd_queue_io(struct dm_crypt_io *io)
{
	struct crypt_config *cc = io->target->private;

	INIT_WORK(&io->work, kcryptd_io);
	queue_work(cc->io_queue, &io->work);
}

M
Milan Broz 已提交
874 875
static void kcryptd_crypt_write_io_submit(struct dm_crypt_io *io,
					  int error, int async)
876
{
M
Milan Broz 已提交
877 878 879 880 881 882 883
	struct bio *clone = io->ctx.bio_out;
	struct crypt_config *cc = io->target->private;

	if (unlikely(error < 0)) {
		crypt_free_buffer_pages(cc, clone);
		bio_put(clone);
		io->error = -EIO;
884
		crypt_dec_pending(io);
M
Milan Broz 已提交
885 886 887 888 889 890 891
		return;
	}

	/* crypt_convert should have filled the clone bio */
	BUG_ON(io->ctx.idx_out < clone->bi_vcnt);

	clone->bi_sector = cc->start + io->sector;
M
Milan Broz 已提交
892

M
Milan Broz 已提交
893 894
	if (async)
		kcryptd_queue_io(io);
895
	else
M
Milan Broz 已提交
896
		generic_make_request(clone);
897 898
}

M
Milan Broz 已提交
899
static void kcryptd_crypt_write_convert(struct dm_crypt_io *io)
900 901 902
{
	struct crypt_config *cc = io->target->private;
	struct bio *clone;
M
Milan Broz 已提交
903
	struct dm_crypt_io *new_io;
M
Milan Broz 已提交
904
	int crypt_finished;
905
	unsigned out_of_pages = 0;
M
Milan Broz 已提交
906
	unsigned remaining = io->base_bio->bi_size;
M
Milan Broz 已提交
907
	sector_t sector = io->sector;
M
Milan Broz 已提交
908
	int r;
909

M
Milan Broz 已提交
910 911 912 913
	/*
	 * Prevent io from disappearing until this function completes.
	 */
	crypt_inc_pending(io);
M
Milan Broz 已提交
914
	crypt_convert_init(cc, &io->ctx, NULL, io->base_bio, sector);
M
Milan Broz 已提交
915

916 917 918 919 920
	/*
	 * The allocated buffers can be smaller than the whole bio,
	 * so repeat the whole process until all the data can be handled.
	 */
	while (remaining) {
921
		clone = crypt_alloc_buffer(io, remaining, &out_of_pages);
922
		if (unlikely(!clone)) {
923
			io->error = -ENOMEM;
M
Milan Broz 已提交
924
			break;
925
		}
926

927 928
		io->ctx.bio_out = clone;
		io->ctx.idx_out = 0;
929

M
Milan Broz 已提交
930
		remaining -= clone->bi_size;
M
Milan Broz 已提交
931
		sector += bio_sectors(clone);
932

M
Milan Broz 已提交
933
		crypt_inc_pending(io);
M
Milan Broz 已提交
934
		r = crypt_convert(cc, &io->ctx);
M
Milan Broz 已提交
935
		crypt_finished = atomic_dec_and_test(&io->ctx.pending);
936

M
Milan Broz 已提交
937 938
		/* Encryption was already finished, submit io now */
		if (crypt_finished) {
M
Milan Broz 已提交
939
			kcryptd_crypt_write_io_submit(io, r, 0);
M
Milan Broz 已提交
940 941 942 943 944

			/*
			 * If there was an error, do not try next fragments.
			 * For async, error is processed in async handler.
			 */
945
			if (unlikely(r < 0))
M
Milan Broz 已提交
946
				break;
M
Milan Broz 已提交
947 948

			io->sector = sector;
M
Milan Broz 已提交
949
		}
950

951 952 953 954 955
		/*
		 * Out of memory -> run queues
		 * But don't wait if split was due to the io size restriction
		 */
		if (unlikely(out_of_pages))
956
			congestion_wait(BLK_RW_ASYNC, HZ/100);
957

M
Milan Broz 已提交
958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984
		/*
		 * With async crypto it is unsafe to share the crypto context
		 * between fragments, so switch to a new dm_crypt_io structure.
		 */
		if (unlikely(!crypt_finished && remaining)) {
			new_io = crypt_io_alloc(io->target, io->base_bio,
						sector);
			crypt_inc_pending(new_io);
			crypt_convert_init(cc, &new_io->ctx, NULL,
					   io->base_bio, sector);
			new_io->ctx.idx_in = io->ctx.idx_in;
			new_io->ctx.offset_in = io->ctx.offset_in;

			/*
			 * Fragments after the first use the base_io
			 * pending count.
			 */
			if (!io->base_io)
				new_io->base_io = io;
			else {
				new_io->base_io = io->base_io;
				crypt_inc_pending(io->base_io);
				crypt_dec_pending(io);
			}

			io = new_io;
		}
985
	}
M
Milan Broz 已提交
986 987

	crypt_dec_pending(io);
988 989
}

990
static void kcryptd_crypt_read_done(struct dm_crypt_io *io, int error)
991 992 993 994 995 996 997
{
	if (unlikely(error < 0))
		io->error = -EIO;

	crypt_dec_pending(io);
}

998
static void kcryptd_crypt_read_convert(struct dm_crypt_io *io)
999 1000
{
	struct crypt_config *cc = io->target->private;
1001
	int r = 0;
L
Linus Torvalds 已提交
1002

M
Milan Broz 已提交
1003
	crypt_inc_pending(io);
M
Milan Broz 已提交
1004

1005
	crypt_convert_init(cc, &io->ctx, io->base_bio, io->base_bio,
1006
			   io->sector);
L
Linus Torvalds 已提交
1007

1008 1009
	r = crypt_convert(cc, &io->ctx);

M
Milan Broz 已提交
1010
	if (atomic_dec_and_test(&io->ctx.pending))
M
Milan Broz 已提交
1011 1012 1013
		kcryptd_crypt_read_done(io, r);

	crypt_dec_pending(io);
L
Linus Torvalds 已提交
1014 1015
}

M
Milan Broz 已提交
1016 1017 1018
static void kcryptd_async_done(struct crypto_async_request *async_req,
			       int error)
{
1019 1020
	struct dm_crypt_request *dmreq = async_req->data;
	struct convert_context *ctx = dmreq->ctx;
M
Milan Broz 已提交
1021 1022 1023 1024 1025 1026 1027 1028
	struct dm_crypt_io *io = container_of(ctx, struct dm_crypt_io, ctx);
	struct crypt_config *cc = io->target->private;

	if (error == -EINPROGRESS) {
		complete(&ctx->restart);
		return;
	}

1029 1030 1031
	if (!error && cc->iv_gen_ops && cc->iv_gen_ops->post)
		error = cc->iv_gen_ops->post(cc, iv_of_dmreq(cc, dmreq), dmreq);

1032
	mempool_free(req_of_dmreq(cc, dmreq), cc->req_pool);
M
Milan Broz 已提交
1033 1034 1035 1036 1037 1038 1039 1040 1041 1042

	if (!atomic_dec_and_test(&ctx->pending))
		return;

	if (bio_data_dir(io->base_bio) == READ)
		kcryptd_crypt_read_done(io, error);
	else
		kcryptd_crypt_write_io_submit(io, error, 1);
}

1043
static void kcryptd_crypt(struct work_struct *work)
L
Linus Torvalds 已提交
1044
{
A
Alasdair G Kergon 已提交
1045
	struct dm_crypt_io *io = container_of(work, struct dm_crypt_io, work);
1046

M
Milan Broz 已提交
1047
	if (bio_data_dir(io->base_bio) == READ)
1048
		kcryptd_crypt_read_convert(io);
1049
	else
1050
		kcryptd_crypt_write_convert(io);
M
Milan Broz 已提交
1051 1052
}

1053
static void kcryptd_queue_crypt(struct dm_crypt_io *io)
M
Milan Broz 已提交
1054
{
1055
	struct crypt_config *cc = io->target->private;
M
Milan Broz 已提交
1056

1057 1058
	INIT_WORK(&io->work, kcryptd_crypt);
	queue_work(cc->crypt_queue, &io->work);
L
Linus Torvalds 已提交
1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071
}

/*
 * Decode key from its hex representation
 */
static int crypt_decode_key(u8 *key, char *hex, unsigned int size)
{
	char buffer[3];
	char *endp;
	unsigned int i;

	buffer[2] = '\0';

1072
	for (i = 0; i < size; i++) {
L
Linus Torvalds 已提交
1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094
		buffer[0] = *hex++;
		buffer[1] = *hex++;

		key[i] = (u8)simple_strtoul(buffer, &endp, 16);

		if (endp != &buffer[2])
			return -EINVAL;
	}

	if (*hex != '\0')
		return -EINVAL;

	return 0;
}

/*
 * Encode key into its hex representation
 */
static void crypt_encode_key(char *hex, u8 *key, unsigned int size)
{
	unsigned int i;

1095
	for (i = 0; i < size; i++) {
L
Linus Torvalds 已提交
1096 1097 1098 1099 1100 1101
		sprintf(hex, "%02x", *key);
		hex += 2;
		key++;
	}
}

M
Milan Broz 已提交
1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131
static void crypt_free_tfms(struct crypt_config *cc, int cpu)
{
	struct crypt_cpu *cpu_cc = per_cpu_ptr(cc->cpu, cpu);
	unsigned i;

	for (i = 0; i < cc->tfms_count; i++)
		if (cpu_cc->tfms[i] && !IS_ERR(cpu_cc->tfms[i])) {
			crypto_free_ablkcipher(cpu_cc->tfms[i]);
			cpu_cc->tfms[i] = NULL;
		}
}

static int crypt_alloc_tfms(struct crypt_config *cc, int cpu, char *ciphermode)
{
	struct crypt_cpu *cpu_cc = per_cpu_ptr(cc->cpu, cpu);
	unsigned i;
	int err;

	for (i = 0; i < cc->tfms_count; i++) {
		cpu_cc->tfms[i] = crypto_alloc_ablkcipher(ciphermode, 0, 0);
		if (IS_ERR(cpu_cc->tfms[i])) {
			err = PTR_ERR(cpu_cc->tfms[i]);
			crypt_free_tfms(cc, cpu);
			return err;
		}
	}

	return 0;
}

A
Andi Kleen 已提交
1132 1133
static int crypt_setkey_allcpus(struct crypt_config *cc)
{
M
Milan Broz 已提交
1134 1135
	unsigned subkey_size = cc->key_size >> ilog2(cc->tfms_count);
	int cpu, err = 0, i, r;
A
Andi Kleen 已提交
1136 1137

	for_each_possible_cpu(cpu) {
M
Milan Broz 已提交
1138 1139 1140 1141 1142 1143
		for (i = 0; i < cc->tfms_count; i++) {
			r = crypto_ablkcipher_setkey(per_cpu_ptr(cc->cpu, cpu)->tfms[i],
						     cc->key + (i * subkey_size), subkey_size);
			if (r)
				err = r;
		}
A
Andi Kleen 已提交
1144 1145 1146 1147 1148
	}

	return err;
}

M
Milan Broz 已提交
1149 1150
static int crypt_set_key(struct crypt_config *cc, char *key)
{
M
Milan Broz 已提交
1151 1152
	/* The key size may not be changed. */
	if (cc->key_size != (strlen(key) >> 1))
M
Milan Broz 已提交
1153 1154
		return -EINVAL;

M
Milan Broz 已提交
1155 1156 1157
	/* Hyphen (which gives a key_size of zero) means there is no key. */
	if (!cc->key_size && strcmp(key, "-"))
		return -EINVAL;
M
Milan Broz 已提交
1158

M
Milan Broz 已提交
1159
	if (cc->key_size && crypt_decode_key(cc->key, key, cc->key_size) < 0)
M
Milan Broz 已提交
1160 1161 1162 1163
		return -EINVAL;

	set_bit(DM_CRYPT_KEY_VALID, &cc->flags);

A
Andi Kleen 已提交
1164
	return crypt_setkey_allcpus(cc);
M
Milan Broz 已提交
1165 1166 1167 1168 1169 1170
}

static int crypt_wipe_key(struct crypt_config *cc)
{
	clear_bit(DM_CRYPT_KEY_VALID, &cc->flags);
	memset(&cc->key, 0, cc->key_size * sizeof(u8));
A
Andi Kleen 已提交
1171 1172

	return crypt_setkey_allcpus(cc);
M
Milan Broz 已提交
1173 1174
}

1175 1176 1177
static void crypt_dtr(struct dm_target *ti)
{
	struct crypt_config *cc = ti->private;
A
Andi Kleen 已提交
1178 1179
	struct crypt_cpu *cpu_cc;
	int cpu;
1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190

	ti->private = NULL;

	if (!cc)
		return;

	if (cc->io_queue)
		destroy_workqueue(cc->io_queue);
	if (cc->crypt_queue)
		destroy_workqueue(cc->crypt_queue);

A
Andi Kleen 已提交
1191 1192 1193 1194 1195
	if (cc->cpu)
		for_each_possible_cpu(cpu) {
			cpu_cc = per_cpu_ptr(cc->cpu, cpu);
			if (cpu_cc->req)
				mempool_free(cpu_cc->req, cc->req_pool);
M
Milan Broz 已提交
1196
			crypt_free_tfms(cc, cpu);
A
Andi Kleen 已提交
1197 1198
		}

1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214
	if (cc->bs)
		bioset_free(cc->bs);

	if (cc->page_pool)
		mempool_destroy(cc->page_pool);
	if (cc->req_pool)
		mempool_destroy(cc->req_pool);
	if (cc->io_pool)
		mempool_destroy(cc->io_pool);

	if (cc->iv_gen_ops && cc->iv_gen_ops->dtr)
		cc->iv_gen_ops->dtr(cc);

	if (cc->dev)
		dm_put_device(ti, cc->dev);

A
Andi Kleen 已提交
1215 1216 1217
	if (cc->cpu)
		free_percpu(cc->cpu);

M
Milan Broz 已提交
1218
	kzfree(cc->cipher);
1219
	kzfree(cc->cipher_string);
1220 1221 1222 1223 1224

	/* Must zero key material before freeing */
	kzfree(cc);
}

M
Milan Broz 已提交
1225 1226
static int crypt_ctr_cipher(struct dm_target *ti,
			    char *cipher_in, char *key)
L
Linus Torvalds 已提交
1227
{
M
Milan Broz 已提交
1228
	struct crypt_config *cc = ti->private;
M
Milan Broz 已提交
1229
	char *tmp, *cipher, *chainmode, *ivmode, *ivopts, *keycount;
M
Milan Broz 已提交
1230
	char *cipher_api = NULL;
A
Andi Kleen 已提交
1231
	int cpu, ret = -EINVAL;
L
Linus Torvalds 已提交
1232

M
Milan Broz 已提交
1233 1234 1235
	/* Convert to crypto api definition? */
	if (strchr(cipher_in, '(')) {
		ti->error = "Bad cipher specification";
L
Linus Torvalds 已提交
1236 1237 1238
		return -EINVAL;
	}

1239 1240 1241 1242
	cc->cipher_string = kstrdup(cipher_in, GFP_KERNEL);
	if (!cc->cipher_string)
		goto bad_mem;

M
Milan Broz 已提交
1243 1244
	/*
	 * Legacy dm-crypt cipher specification
M
Milan Broz 已提交
1245
	 * cipher[:keycount]-mode-iv:ivopts
M
Milan Broz 已提交
1246 1247
	 */
	tmp = cipher_in;
M
Milan Broz 已提交
1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258
	keycount = strsep(&tmp, "-");
	cipher = strsep(&keycount, ":");

	if (!keycount)
		cc->tfms_count = 1;
	else if (sscanf(keycount, "%u", &cc->tfms_count) != 1 ||
		 !is_power_of_2(cc->tfms_count)) {
		ti->error = "Bad cipher key count specification";
		return -EINVAL;
	}
	cc->key_parts = cc->tfms_count;
M
Milan Broz 已提交
1259 1260 1261 1262 1263

	cc->cipher = kstrdup(cipher, GFP_KERNEL);
	if (!cc->cipher)
		goto bad_mem;

L
Linus Torvalds 已提交
1264 1265 1266 1267 1268
	chainmode = strsep(&tmp, "-");
	ivopts = strsep(&tmp, "-");
	ivmode = strsep(&ivopts, ":");

	if (tmp)
M
Milan Broz 已提交
1269
		DMWARN("Ignoring unexpected additional cipher options");
L
Linus Torvalds 已提交
1270

M
Milan Broz 已提交
1271 1272 1273
	cc->cpu = __alloc_percpu(sizeof(*(cc->cpu)) +
				 cc->tfms_count * sizeof(*(cc->cpu->tfms)),
				 __alignof__(struct crypt_cpu));
A
Andi Kleen 已提交
1274 1275 1276 1277 1278
	if (!cc->cpu) {
		ti->error = "Cannot allocate per cpu state";
		goto bad_mem;
	}

1279 1280 1281 1282
	/*
	 * For compatibility with the original dm-crypt mapping format, if
	 * only the cipher name is supplied, use cbc-plain.
	 */
M
Milan Broz 已提交
1283
	if (!chainmode || (!strcmp(chainmode, "plain") && !ivmode)) {
L
Linus Torvalds 已提交
1284 1285 1286 1287
		chainmode = "cbc";
		ivmode = "plain";
	}

1288
	if (strcmp(chainmode, "ecb") && !ivmode) {
M
Milan Broz 已提交
1289 1290
		ti->error = "IV mechanism required";
		return -EINVAL;
L
Linus Torvalds 已提交
1291 1292
	}

M
Milan Broz 已提交
1293 1294 1295 1296 1297 1298 1299 1300 1301
	cipher_api = kmalloc(CRYPTO_MAX_ALG_NAME, GFP_KERNEL);
	if (!cipher_api)
		goto bad_mem;

	ret = snprintf(cipher_api, CRYPTO_MAX_ALG_NAME,
		       "%s(%s)", chainmode, cipher);
	if (ret < 0) {
		kfree(cipher_api);
		goto bad_mem;
L
Linus Torvalds 已提交
1302 1303
	}

M
Milan Broz 已提交
1304
	/* Allocate cipher */
A
Andi Kleen 已提交
1305
	for_each_possible_cpu(cpu) {
M
Milan Broz 已提交
1306 1307
		ret = crypt_alloc_tfms(cc, cpu, cipher_api);
		if (ret < 0) {
A
Andi Kleen 已提交
1308 1309 1310
			ti->error = "Error allocating crypto tfm";
			goto bad;
		}
L
Linus Torvalds 已提交
1311 1312
	}

M
Milan Broz 已提交
1313 1314
	/* Initialize and set key */
	ret = crypt_set_key(cc, key);
1315
	if (ret < 0) {
1316
		ti->error = "Error decoding and setting key";
1317
		goto bad;
1318 1319
	}

M
Milan Broz 已提交
1320
	/* Initialize IV */
A
Andi Kleen 已提交
1321
	cc->iv_size = crypto_ablkcipher_ivsize(any_tfm(cc));
M
Milan Broz 已提交
1322 1323 1324 1325 1326 1327 1328 1329 1330 1331
	if (cc->iv_size)
		/* at least a 64 bit sector number should fit in our buffer */
		cc->iv_size = max(cc->iv_size,
				  (unsigned int)(sizeof(u64) / sizeof(u8)));
	else if (ivmode) {
		DMWARN("Selected cipher does not support IVs");
		ivmode = NULL;
	}

	/* Choose ivmode, see comments at iv code. */
L
Linus Torvalds 已提交
1332 1333 1334 1335
	if (ivmode == NULL)
		cc->iv_gen_ops = NULL;
	else if (strcmp(ivmode, "plain") == 0)
		cc->iv_gen_ops = &crypt_iv_plain_ops;
M
Milan Broz 已提交
1336 1337
	else if (strcmp(ivmode, "plain64") == 0)
		cc->iv_gen_ops = &crypt_iv_plain64_ops;
L
Linus Torvalds 已提交
1338 1339
	else if (strcmp(ivmode, "essiv") == 0)
		cc->iv_gen_ops = &crypt_iv_essiv_ops;
1340 1341
	else if (strcmp(ivmode, "benbi") == 0)
		cc->iv_gen_ops = &crypt_iv_benbi_ops;
L
Ludwig Nussel 已提交
1342 1343
	else if (strcmp(ivmode, "null") == 0)
		cc->iv_gen_ops = &crypt_iv_null_ops;
L
Linus Torvalds 已提交
1344
	else {
M
Milan Broz 已提交
1345
		ret = -EINVAL;
1346
		ti->error = "Invalid IV mode";
1347
		goto bad;
L
Linus Torvalds 已提交
1348 1349
	}

1350 1351 1352 1353 1354 1355 1356 1357
	/* Allocate IV */
	if (cc->iv_gen_ops && cc->iv_gen_ops->ctr) {
		ret = cc->iv_gen_ops->ctr(cc, ti, ivopts);
		if (ret < 0) {
			ti->error = "Error creating IV";
			goto bad;
		}
	}
L
Linus Torvalds 已提交
1358

1359 1360 1361 1362 1363 1364 1365
	/* Initialize IV (set keys for ESSIV etc) */
	if (cc->iv_gen_ops && cc->iv_gen_ops->init) {
		ret = cc->iv_gen_ops->init(cc);
		if (ret < 0) {
			ti->error = "Error initialising IV";
			goto bad;
		}
1366 1367
	}

M
Milan Broz 已提交
1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391
	ret = 0;
bad:
	kfree(cipher_api);
	return ret;

bad_mem:
	ti->error = "Cannot allocate cipher strings";
	return -ENOMEM;
}

/*
 * Construct an encryption mapping:
 * <cipher> <key> <iv_offset> <dev_path> <start>
 */
static int crypt_ctr(struct dm_target *ti, unsigned int argc, char **argv)
{
	struct crypt_config *cc;
	unsigned int key_size;
	unsigned long long tmpll;
	int ret;

	if (argc != 5) {
		ti->error = "Not enough arguments";
		return -EINVAL;
L
Linus Torvalds 已提交
1392 1393
	}

M
Milan Broz 已提交
1394 1395 1396 1397 1398 1399 1400
	key_size = strlen(argv[1]) >> 1;

	cc = kzalloc(sizeof(*cc) + key_size * sizeof(u8), GFP_KERNEL);
	if (!cc) {
		ti->error = "Cannot allocate encryption context";
		return -ENOMEM;
	}
M
Milan Broz 已提交
1401
	cc->key_size = key_size;
M
Milan Broz 已提交
1402 1403 1404 1405 1406 1407

	ti->private = cc;
	ret = crypt_ctr_cipher(ti, argv[0], argv[1]);
	if (ret < 0)
		goto bad;

1408
	ret = -ENOMEM;
1409
	cc->io_pool = mempool_create_slab_pool(MIN_IOS, _crypt_io_pool);
L
Linus Torvalds 已提交
1410
	if (!cc->io_pool) {
1411
		ti->error = "Cannot allocate crypt io mempool";
1412
		goto bad;
L
Linus Torvalds 已提交
1413 1414
	}

M
Milan Broz 已提交
1415
	cc->dmreq_start = sizeof(struct ablkcipher_request);
A
Andi Kleen 已提交
1416
	cc->dmreq_start += crypto_ablkcipher_reqsize(any_tfm(cc));
M
Milan Broz 已提交
1417
	cc->dmreq_start = ALIGN(cc->dmreq_start, crypto_tfm_ctx_alignment());
A
Andi Kleen 已提交
1418
	cc->dmreq_start += crypto_ablkcipher_alignmask(any_tfm(cc)) &
M
Milan Broz 已提交
1419
			   ~(crypto_tfm_ctx_alignment() - 1);
M
Milan Broz 已提交
1420 1421 1422 1423 1424

	cc->req_pool = mempool_create_kmalloc_pool(MIN_IOS, cc->dmreq_start +
			sizeof(struct dm_crypt_request) + cc->iv_size);
	if (!cc->req_pool) {
		ti->error = "Cannot allocate crypt request mempool";
1425
		goto bad;
M
Milan Broz 已提交
1426 1427
	}

1428
	cc->page_pool = mempool_create_page_pool(MIN_POOL_PAGES, 0);
L
Linus Torvalds 已提交
1429
	if (!cc->page_pool) {
1430
		ti->error = "Cannot allocate page mempool";
1431
		goto bad;
L
Linus Torvalds 已提交
1432 1433
	}

1434
	cc->bs = bioset_create(MIN_IOS, 0);
M
Milan Broz 已提交
1435 1436
	if (!cc->bs) {
		ti->error = "Cannot allocate crypt bioset";
1437
		goto bad;
M
Milan Broz 已提交
1438 1439
	}

1440
	ret = -EINVAL;
A
Andrew Morton 已提交
1441
	if (sscanf(argv[2], "%llu", &tmpll) != 1) {
1442
		ti->error = "Invalid iv_offset sector";
1443
		goto bad;
L
Linus Torvalds 已提交
1444
	}
A
Andrew Morton 已提交
1445
	cc->iv_offset = tmpll;
L
Linus Torvalds 已提交
1446

1447 1448 1449 1450 1451
	if (dm_get_device(ti, argv[3], dm_table_get_mode(ti->table), &cc->dev)) {
		ti->error = "Device lookup failed";
		goto bad;
	}

A
Andrew Morton 已提交
1452
	if (sscanf(argv[4], "%llu", &tmpll) != 1) {
1453
		ti->error = "Invalid device sector";
1454
		goto bad;
L
Linus Torvalds 已提交
1455
	}
A
Andrew Morton 已提交
1456
	cc->start = tmpll;
L
Linus Torvalds 已提交
1457

1458
	ret = -ENOMEM;
A
Andi Kleen 已提交
1459 1460 1461 1462
	cc->io_queue = alloc_workqueue("kcryptd_io",
				       WQ_NON_REENTRANT|
				       WQ_MEM_RECLAIM,
				       1);
M
Milan Broz 已提交
1463 1464
	if (!cc->io_queue) {
		ti->error = "Couldn't create kcryptd io queue";
1465
		goto bad;
M
Milan Broz 已提交
1466 1467
	}

A
Andi Kleen 已提交
1468 1469 1470 1471 1472
	cc->crypt_queue = alloc_workqueue("kcryptd",
					  WQ_NON_REENTRANT|
					  WQ_CPU_INTENSIVE|
					  WQ_MEM_RECLAIM,
					  1);
M
Milan Broz 已提交
1473
	if (!cc->crypt_queue) {
1474
		ti->error = "Couldn't create kcryptd queue";
1475
		goto bad;
1476 1477
	}

M
Mikulas Patocka 已提交
1478
	ti->num_flush_requests = 1;
L
Linus Torvalds 已提交
1479 1480
	return 0;

1481 1482 1483
bad:
	crypt_dtr(ti);
	return ret;
L
Linus Torvalds 已提交
1484 1485 1486 1487 1488
}

static int crypt_map(struct dm_target *ti, struct bio *bio,
		     union map_info *map_context)
{
A
Alasdair G Kergon 已提交
1489
	struct dm_crypt_io *io;
M
Mikulas Patocka 已提交
1490 1491
	struct crypt_config *cc;

1492
	if (bio->bi_rw & REQ_FLUSH) {
M
Mikulas Patocka 已提交
1493 1494 1495 1496
		cc = ti->private;
		bio->bi_bdev = cc->dev->bdev;
		return DM_MAPIO_REMAPPED;
	}
L
Linus Torvalds 已提交
1497

1498
	io = crypt_io_alloc(ti, bio, dm_target_offset(ti, bio->bi_sector));
M
Milan Broz 已提交
1499

1500 1501 1502 1503
	if (bio_data_dir(io->base_bio) == READ) {
		if (kcryptd_io_read(io, GFP_NOWAIT))
			kcryptd_queue_io(io);
	} else
M
Milan Broz 已提交
1504
		kcryptd_queue_crypt(io);
L
Linus Torvalds 已提交
1505

1506
	return DM_MAPIO_SUBMITTED;
L
Linus Torvalds 已提交
1507 1508 1509 1510 1511
}

static int crypt_status(struct dm_target *ti, status_type_t type,
			char *result, unsigned int maxlen)
{
M
Milan Broz 已提交
1512
	struct crypt_config *cc = ti->private;
L
Linus Torvalds 已提交
1513 1514 1515 1516 1517 1518 1519 1520
	unsigned int sz = 0;

	switch (type) {
	case STATUSTYPE_INFO:
		result[0] = '\0';
		break;

	case STATUSTYPE_TABLE:
1521
		DMEMIT("%s ", cc->cipher_string);
L
Linus Torvalds 已提交
1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534

		if (cc->key_size > 0) {
			if ((maxlen - sz) < ((cc->key_size << 1) + 1))
				return -ENOMEM;

			crypt_encode_key(result + sz, cc->key, cc->key_size);
			sz += cc->key_size << 1;
		} else {
			if (sz >= maxlen)
				return -ENOMEM;
			result[sz++] = '-';
		}

A
Andrew Morton 已提交
1535 1536
		DMEMIT(" %llu %s %llu", (unsigned long long)cc->iv_offset,
				cc->dev->name, (unsigned long long)cc->start);
L
Linus Torvalds 已提交
1537 1538 1539 1540 1541
		break;
	}
	return 0;
}

M
Milan Broz 已提交
1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574
static void crypt_postsuspend(struct dm_target *ti)
{
	struct crypt_config *cc = ti->private;

	set_bit(DM_CRYPT_SUSPENDED, &cc->flags);
}

static int crypt_preresume(struct dm_target *ti)
{
	struct crypt_config *cc = ti->private;

	if (!test_bit(DM_CRYPT_KEY_VALID, &cc->flags)) {
		DMERR("aborting resume - crypt key is not set.");
		return -EAGAIN;
	}

	return 0;
}

static void crypt_resume(struct dm_target *ti)
{
	struct crypt_config *cc = ti->private;

	clear_bit(DM_CRYPT_SUSPENDED, &cc->flags);
}

/* Message interface
 *	key set <key>
 *	key wipe
 */
static int crypt_message(struct dm_target *ti, unsigned argc, char **argv)
{
	struct crypt_config *cc = ti->private;
1575
	int ret = -EINVAL;
M
Milan Broz 已提交
1576 1577 1578 1579 1580 1581 1582 1583 1584

	if (argc < 2)
		goto error;

	if (!strnicmp(argv[0], MESG_STR("key"))) {
		if (!test_bit(DM_CRYPT_SUSPENDED, &cc->flags)) {
			DMWARN("not suspended during key manipulation.");
			return -EINVAL;
		}
1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598
		if (argc == 3 && !strnicmp(argv[1], MESG_STR("set"))) {
			ret = crypt_set_key(cc, argv[2]);
			if (ret)
				return ret;
			if (cc->iv_gen_ops && cc->iv_gen_ops->init)
				ret = cc->iv_gen_ops->init(cc);
			return ret;
		}
		if (argc == 2 && !strnicmp(argv[1], MESG_STR("wipe"))) {
			if (cc->iv_gen_ops && cc->iv_gen_ops->wipe) {
				ret = cc->iv_gen_ops->wipe(cc);
				if (ret)
					return ret;
			}
M
Milan Broz 已提交
1599
			return crypt_wipe_key(cc);
1600
		}
M
Milan Broz 已提交
1601 1602 1603 1604 1605 1606 1607
	}

error:
	DMWARN("unrecognised message received.");
	return -EINVAL;
}

M
Milan Broz 已提交
1608 1609 1610 1611 1612 1613 1614 1615 1616 1617
static int crypt_merge(struct dm_target *ti, struct bvec_merge_data *bvm,
		       struct bio_vec *biovec, int max_size)
{
	struct crypt_config *cc = ti->private;
	struct request_queue *q = bdev_get_queue(cc->dev->bdev);

	if (!q->merge_bvec_fn)
		return max_size;

	bvm->bi_bdev = cc->dev->bdev;
1618
	bvm->bi_sector = cc->start + dm_target_offset(ti, bvm->bi_sector);
M
Milan Broz 已提交
1619 1620 1621 1622

	return min(max_size, q->merge_bvec_fn(q, bvm, biovec));
}

1623 1624 1625 1626 1627
static int crypt_iterate_devices(struct dm_target *ti,
				 iterate_devices_callout_fn fn, void *data)
{
	struct crypt_config *cc = ti->private;

1628
	return fn(ti, cc->dev, cc->start, ti->len, data);
1629 1630
}

L
Linus Torvalds 已提交
1631 1632
static struct target_type crypt_target = {
	.name   = "crypt",
M
Milan Broz 已提交
1633
	.version = {1, 10, 0},
L
Linus Torvalds 已提交
1634 1635 1636 1637 1638
	.module = THIS_MODULE,
	.ctr    = crypt_ctr,
	.dtr    = crypt_dtr,
	.map    = crypt_map,
	.status = crypt_status,
M
Milan Broz 已提交
1639 1640 1641 1642
	.postsuspend = crypt_postsuspend,
	.preresume = crypt_preresume,
	.resume = crypt_resume,
	.message = crypt_message,
M
Milan Broz 已提交
1643
	.merge  = crypt_merge,
1644
	.iterate_devices = crypt_iterate_devices,
L
Linus Torvalds 已提交
1645 1646 1647 1648 1649 1650
};

static int __init dm_crypt_init(void)
{
	int r;

A
Alasdair G Kergon 已提交
1651
	_crypt_io_pool = KMEM_CACHE(dm_crypt_io, 0);
L
Linus Torvalds 已提交
1652 1653 1654 1655 1656
	if (!_crypt_io_pool)
		return -ENOMEM;

	r = dm_register_target(&crypt_target);
	if (r < 0) {
1657
		DMERR("register failed %d", r);
1658
		kmem_cache_destroy(_crypt_io_pool);
L
Linus Torvalds 已提交
1659 1660 1661 1662 1663 1664 1665
	}

	return r;
}

static void __exit dm_crypt_exit(void)
{
1666
	dm_unregister_target(&crypt_target);
L
Linus Torvalds 已提交
1667 1668 1669 1670 1671 1672 1673 1674 1675
	kmem_cache_destroy(_crypt_io_pool);
}

module_init(dm_crypt_init);
module_exit(dm_crypt_exit);

MODULE_AUTHOR("Christophe Saout <christophe@saout.de>");
MODULE_DESCRIPTION(DM_NAME " target for transparent encryption / decryption");
MODULE_LICENSE("GPL");