18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * drivers/hyperhold/hp_core.c 48c2ecf20Sopenharmony_ci * 58c2ecf20Sopenharmony_ci * Copyright (c) 2020-2022 Huawei Technologies Co., Ltd. 68c2ecf20Sopenharmony_ci */ 78c2ecf20Sopenharmony_ci 88c2ecf20Sopenharmony_ci #define pr_fmt(fmt) "[HYPERHOLD]" fmt 98c2ecf20Sopenharmony_ci 108c2ecf20Sopenharmony_ci#include <linux/module.h> 118c2ecf20Sopenharmony_ci#include <linux/blkdev.h> 128c2ecf20Sopenharmony_ci#include <linux/sysctl.h> 138c2ecf20Sopenharmony_ci 148c2ecf20Sopenharmony_ci#include "hyperhold.h" 158c2ecf20Sopenharmony_ci#include "hp_device.h" 168c2ecf20Sopenharmony_ci#include "hp_space.h" 178c2ecf20Sopenharmony_ci#include "hp_iotab.h" 188c2ecf20Sopenharmony_ci 198c2ecf20Sopenharmony_ci#define HP_DFLT_DEVICE "/dev/by-name/hyperhold" 208c2ecf20Sopenharmony_ci#define HP_DFLT_EXT_SIZE (1 << 15) 218c2ecf20Sopenharmony_ci#define HP_DEV_NAME_LEN 256 228c2ecf20Sopenharmony_ci#define HP_STATE_LEN 10 238c2ecf20Sopenharmony_ci 248c2ecf20Sopenharmony_ci#define CHECK(cond, ...) ((cond) || (pr_err(__VA_ARGS__), false)) 258c2ecf20Sopenharmony_ci#define CHECK_BOUND(var, min, max) \ 268c2ecf20Sopenharmony_ci CHECK((var) >= (min) && (var) <= (max), \ 278c2ecf20Sopenharmony_ci "%s %u out of bounds %u ~ %u!\n", #var, (var), (min), (max)) 288c2ecf20Sopenharmony_ci#define CHECK_INITED CHECK(hyperhold.inited, "hyperhold is not enable!\n") 298c2ecf20Sopenharmony_ci#define CHECK_ENABLE (CHECK_INITED && CHECK(hyperhold.enable, "hyperhold is readonly!\n")) 308c2ecf20Sopenharmony_ci 318c2ecf20Sopenharmony_cistruct hyperhold { 328c2ecf20Sopenharmony_ci bool enable; 338c2ecf20Sopenharmony_ci bool inited; 348c2ecf20Sopenharmony_ci 358c2ecf20Sopenharmony_ci char device_name[HP_DEV_NAME_LEN]; 368c2ecf20Sopenharmony_ci u32 extent_size; 378c2ecf20Sopenharmony_ci u32 enable_soft_crypt; 388c2ecf20Sopenharmony_ci 398c2ecf20Sopenharmony_ci struct hp_device dev; 408c2ecf20Sopenharmony_ci struct hp_space spc; 418c2ecf20Sopenharmony_ci 428c2ecf20Sopenharmony_ci struct workqueue_struct *read_wq; 438c2ecf20Sopenharmony_ci struct workqueue_struct *write_wq; 448c2ecf20Sopenharmony_ci 458c2ecf20Sopenharmony_ci struct mutex init_lock; 468c2ecf20Sopenharmony_ci}; 478c2ecf20Sopenharmony_ci 488c2ecf20Sopenharmony_cistruct hyperhold hyperhold; 498c2ecf20Sopenharmony_ci 508c2ecf20Sopenharmony_ciatomic64_t mem_used = ATOMIC64_INIT(0); 518c2ecf20Sopenharmony_ci#ifdef CONFIG_HYPERHOLD_DEBUG 528c2ecf20Sopenharmony_ci/* 538c2ecf20Sopenharmony_ci * return the memory overhead of hyperhold module 548c2ecf20Sopenharmony_ci */ 558c2ecf20Sopenharmony_ciu64 hyperhold_memory_used(void) 568c2ecf20Sopenharmony_ci{ 578c2ecf20Sopenharmony_ci return atomic64_read(&mem_used) + hpio_memory() + space_memory(); 588c2ecf20Sopenharmony_ci} 598c2ecf20Sopenharmony_ci#endif 608c2ecf20Sopenharmony_ci 618c2ecf20Sopenharmony_civoid hyperhold_disable(bool force) 628c2ecf20Sopenharmony_ci{ 638c2ecf20Sopenharmony_ci if (!CHECK_INITED) 648c2ecf20Sopenharmony_ci return; 658c2ecf20Sopenharmony_ci if (!force && !CHECK_ENABLE) 668c2ecf20Sopenharmony_ci return; 678c2ecf20Sopenharmony_ci 688c2ecf20Sopenharmony_ci mutex_lock(&hyperhold.init_lock); 698c2ecf20Sopenharmony_ci hyperhold.enable = false; 708c2ecf20Sopenharmony_ci if (!wait_for_space_empty(&hyperhold.spc, force)) 718c2ecf20Sopenharmony_ci goto out; 728c2ecf20Sopenharmony_ci hyperhold.inited = false; 738c2ecf20Sopenharmony_ci wait_for_iotab_empty(); 748c2ecf20Sopenharmony_ci destroy_workqueue(hyperhold.read_wq); 758c2ecf20Sopenharmony_ci destroy_workqueue(hyperhold.write_wq); 768c2ecf20Sopenharmony_ci deinit_space(&hyperhold.spc); 778c2ecf20Sopenharmony_ci crypto_deinit(&hyperhold.dev); 788c2ecf20Sopenharmony_ci unbind_bdev(&hyperhold.dev); 798c2ecf20Sopenharmony_ciout: 808c2ecf20Sopenharmony_ci if (hyperhold.inited) 818c2ecf20Sopenharmony_ci pr_info("hyperhold is disabled, read only.\n"); 828c2ecf20Sopenharmony_ci else 838c2ecf20Sopenharmony_ci pr_info("hyperhold is totally disabled!\n"); 848c2ecf20Sopenharmony_ci mutex_unlock(&hyperhold.init_lock); 858c2ecf20Sopenharmony_ci} 868c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_disable); 878c2ecf20Sopenharmony_ci 888c2ecf20Sopenharmony_civoid hyperhold_enable(void) 898c2ecf20Sopenharmony_ci{ 908c2ecf20Sopenharmony_ci bool enable = true; 918c2ecf20Sopenharmony_ci 928c2ecf20Sopenharmony_ci if (hyperhold.inited) 938c2ecf20Sopenharmony_ci goto out; 948c2ecf20Sopenharmony_ci 958c2ecf20Sopenharmony_ci mutex_lock(&hyperhold.init_lock); 968c2ecf20Sopenharmony_ci if (hyperhold.inited) 978c2ecf20Sopenharmony_ci goto unlock; 988c2ecf20Sopenharmony_ci if (!bind_bdev(&hyperhold.dev, hyperhold.device_name)) 998c2ecf20Sopenharmony_ci goto err1; 1008c2ecf20Sopenharmony_ci if (!crypto_init(&hyperhold.dev, hyperhold.enable_soft_crypt)) 1018c2ecf20Sopenharmony_ci goto err2; 1028c2ecf20Sopenharmony_ci if (!init_space(&hyperhold.spc, hyperhold.dev.dev_size, hyperhold.extent_size)) 1038c2ecf20Sopenharmony_ci goto err3; 1048c2ecf20Sopenharmony_ci hyperhold.read_wq = alloc_workqueue("hyperhold_read", WQ_HIGHPRI | WQ_UNBOUND, 0); 1058c2ecf20Sopenharmony_ci if (!hyperhold.read_wq) 1068c2ecf20Sopenharmony_ci goto err4; 1078c2ecf20Sopenharmony_ci hyperhold.write_wq = alloc_workqueue("hyperhold_write", 0, 0); 1088c2ecf20Sopenharmony_ci if (!hyperhold.write_wq) 1098c2ecf20Sopenharmony_ci goto err5; 1108c2ecf20Sopenharmony_ci hyperhold.inited = true; 1118c2ecf20Sopenharmony_ci goto unlock; 1128c2ecf20Sopenharmony_cierr5: 1138c2ecf20Sopenharmony_ci destroy_workqueue(hyperhold.read_wq); 1148c2ecf20Sopenharmony_cierr4: 1158c2ecf20Sopenharmony_ci deinit_space(&hyperhold.spc); 1168c2ecf20Sopenharmony_cierr3: 1178c2ecf20Sopenharmony_ci crypto_deinit(&hyperhold.dev); 1188c2ecf20Sopenharmony_cierr2: 1198c2ecf20Sopenharmony_ci unbind_bdev(&hyperhold.dev); 1208c2ecf20Sopenharmony_cierr1: 1218c2ecf20Sopenharmony_ci enable = false; 1228c2ecf20Sopenharmony_ciunlock: 1238c2ecf20Sopenharmony_ci mutex_unlock(&hyperhold.init_lock); 1248c2ecf20Sopenharmony_ciout: 1258c2ecf20Sopenharmony_ci if (enable) { 1268c2ecf20Sopenharmony_ci hyperhold.enable = true; 1278c2ecf20Sopenharmony_ci pr_info("hyperhold is enabled.\n"); 1288c2ecf20Sopenharmony_ci } else { 1298c2ecf20Sopenharmony_ci hyperhold.enable = false; 1308c2ecf20Sopenharmony_ci pr_err("hyperhold enable failed!\n"); 1318c2ecf20Sopenharmony_ci } 1328c2ecf20Sopenharmony_ci} 1338c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_enable); 1348c2ecf20Sopenharmony_ci 1358c2ecf20Sopenharmony_cistatic int enable_sysctl_handler(struct ctl_table *table, int write, 1368c2ecf20Sopenharmony_ci void *buffer, size_t *lenp, loff_t *ppos) 1378c2ecf20Sopenharmony_ci{ 1388c2ecf20Sopenharmony_ci const struct cred *cred = current_cred(); 1398c2ecf20Sopenharmony_ci char *filter_buf; 1408c2ecf20Sopenharmony_ci 1418c2ecf20Sopenharmony_ci filter_buf = strstrip((char *)buffer); 1428c2ecf20Sopenharmony_ci if (write) { 1438c2ecf20Sopenharmony_ci if (!uid_eq(cred->euid, GLOBAL_MEMMGR_UID) && 1448c2ecf20Sopenharmony_ci !uid_eq(cred->euid, GLOBAL_ROOT_UID)) { 1458c2ecf20Sopenharmony_ci pr_err("no permission to enable/disable eswap!\n"); 1468c2ecf20Sopenharmony_ci return 0; 1478c2ecf20Sopenharmony_ci } 1488c2ecf20Sopenharmony_ci if (!strcmp(filter_buf, "enable")) 1498c2ecf20Sopenharmony_ci hyperhold_enable(); 1508c2ecf20Sopenharmony_ci else if (!strcmp(filter_buf, "disable")) 1518c2ecf20Sopenharmony_ci hyperhold_disable(false); 1528c2ecf20Sopenharmony_ci else if (!strcmp(filter_buf, "force_disable")) 1538c2ecf20Sopenharmony_ci hyperhold_disable(true); 1548c2ecf20Sopenharmony_ci } else { 1558c2ecf20Sopenharmony_ci if (*lenp < HP_STATE_LEN || *ppos) { 1568c2ecf20Sopenharmony_ci *lenp = 0; 1578c2ecf20Sopenharmony_ci return 0; 1588c2ecf20Sopenharmony_ci } 1598c2ecf20Sopenharmony_ci if (hyperhold.enable) 1608c2ecf20Sopenharmony_ci strcpy(buffer, "enable\n"); 1618c2ecf20Sopenharmony_ci else if (hyperhold.inited) 1628c2ecf20Sopenharmony_ci strcpy(buffer, "readonly\n"); 1638c2ecf20Sopenharmony_ci else 1648c2ecf20Sopenharmony_ci strcpy(buffer, "disable\n"); 1658c2ecf20Sopenharmony_ci *lenp = strlen(buffer); 1668c2ecf20Sopenharmony_ci *ppos += *lenp; 1678c2ecf20Sopenharmony_ci#ifdef CONFIG_HYPERHOLD_DEBUG 1688c2ecf20Sopenharmony_ci pr_info("hyperhold memory overhead = %llu.\n", hyperhold_memory_used()); 1698c2ecf20Sopenharmony_ci#endif 1708c2ecf20Sopenharmony_ci } 1718c2ecf20Sopenharmony_ci return 0; 1728c2ecf20Sopenharmony_ci} 1738c2ecf20Sopenharmony_ci 1748c2ecf20Sopenharmony_cistatic int device_sysctl_handler(struct ctl_table *table, int write, 1758c2ecf20Sopenharmony_ci void *buffer, size_t *lenp, loff_t *ppos) 1768c2ecf20Sopenharmony_ci{ 1778c2ecf20Sopenharmony_ci int ret; 1788c2ecf20Sopenharmony_ci 1798c2ecf20Sopenharmony_ci mutex_lock(&hyperhold.init_lock); 1808c2ecf20Sopenharmony_ci if (write && hyperhold.inited) { 1818c2ecf20Sopenharmony_ci pr_err("hyperhold device is busy!\n"); 1828c2ecf20Sopenharmony_ci ret = -EBUSY; 1838c2ecf20Sopenharmony_ci goto unlock; 1848c2ecf20Sopenharmony_ci } 1858c2ecf20Sopenharmony_ci ret = proc_dostring(table, write, buffer, lenp, ppos); 1868c2ecf20Sopenharmony_ci if (write && !ret) { 1878c2ecf20Sopenharmony_ci hyperhold.enable_soft_crypt = 1; 1888c2ecf20Sopenharmony_ci pr_info("device changed, default enable soft crypt.\n"); 1898c2ecf20Sopenharmony_ci } 1908c2ecf20Sopenharmony_ciunlock: 1918c2ecf20Sopenharmony_ci mutex_unlock(&hyperhold.init_lock); 1928c2ecf20Sopenharmony_ci 1938c2ecf20Sopenharmony_ci return ret; 1948c2ecf20Sopenharmony_ci} 1958c2ecf20Sopenharmony_ci 1968c2ecf20Sopenharmony_cistatic int extent_sysctl_handler(struct ctl_table *table, int write, 1978c2ecf20Sopenharmony_ci void *buffer, size_t *lenp, loff_t *ppos) 1988c2ecf20Sopenharmony_ci{ 1998c2ecf20Sopenharmony_ci int ret; 2008c2ecf20Sopenharmony_ci 2018c2ecf20Sopenharmony_ci mutex_lock(&hyperhold.init_lock); 2028c2ecf20Sopenharmony_ci if (write && hyperhold.inited) { 2038c2ecf20Sopenharmony_ci pr_err("hyperhold device is busy!\n"); 2048c2ecf20Sopenharmony_ci ret = -EBUSY; 2058c2ecf20Sopenharmony_ci goto unlock; 2068c2ecf20Sopenharmony_ci } 2078c2ecf20Sopenharmony_ci ret = proc_douintvec(table, write, buffer, lenp, ppos); 2088c2ecf20Sopenharmony_ciunlock: 2098c2ecf20Sopenharmony_ci mutex_unlock(&hyperhold.init_lock); 2108c2ecf20Sopenharmony_ci 2118c2ecf20Sopenharmony_ci return ret; 2128c2ecf20Sopenharmony_ci} 2138c2ecf20Sopenharmony_ci 2148c2ecf20Sopenharmony_cistatic int crypto_sysctl_handler(struct ctl_table *table, int write, 2158c2ecf20Sopenharmony_ci void *buffer, size_t *lenp, loff_t *ppos) 2168c2ecf20Sopenharmony_ci{ 2178c2ecf20Sopenharmony_ci int ret; 2188c2ecf20Sopenharmony_ci 2198c2ecf20Sopenharmony_ci mutex_lock(&hyperhold.init_lock); 2208c2ecf20Sopenharmony_ci if (write && hyperhold.inited) { 2218c2ecf20Sopenharmony_ci pr_err("hyperhold device is busy!\n"); 2228c2ecf20Sopenharmony_ci ret = -EBUSY; 2238c2ecf20Sopenharmony_ci goto unlock; 2248c2ecf20Sopenharmony_ci } 2258c2ecf20Sopenharmony_ci ret = proc_douintvec_minmax(table, write, buffer, lenp, ppos); 2268c2ecf20Sopenharmony_ciunlock: 2278c2ecf20Sopenharmony_ci mutex_unlock(&hyperhold.init_lock); 2288c2ecf20Sopenharmony_ci 2298c2ecf20Sopenharmony_ci return ret; 2308c2ecf20Sopenharmony_ci} 2318c2ecf20Sopenharmony_ci 2328c2ecf20Sopenharmony_cistatic struct ctl_table_header *hp_sysctl_header; 2338c2ecf20Sopenharmony_cistatic struct ctl_table hp_table[] = { 2348c2ecf20Sopenharmony_ci { 2358c2ecf20Sopenharmony_ci .procname = "enable", 2368c2ecf20Sopenharmony_ci .mode = 0666, 2378c2ecf20Sopenharmony_ci .proc_handler = enable_sysctl_handler, 2388c2ecf20Sopenharmony_ci }, 2398c2ecf20Sopenharmony_ci { 2408c2ecf20Sopenharmony_ci .procname = "device", 2418c2ecf20Sopenharmony_ci .data = &hyperhold.device_name, 2428c2ecf20Sopenharmony_ci .maxlen = sizeof(hyperhold.device_name), 2438c2ecf20Sopenharmony_ci .mode = 0644, 2448c2ecf20Sopenharmony_ci .proc_handler = device_sysctl_handler, 2458c2ecf20Sopenharmony_ci }, 2468c2ecf20Sopenharmony_ci { 2478c2ecf20Sopenharmony_ci .procname = "extent_size", 2488c2ecf20Sopenharmony_ci .data = &hyperhold.extent_size, 2498c2ecf20Sopenharmony_ci .maxlen = sizeof(hyperhold.extent_size), 2508c2ecf20Sopenharmony_ci .mode = 0644, 2518c2ecf20Sopenharmony_ci .proc_handler = extent_sysctl_handler, 2528c2ecf20Sopenharmony_ci }, 2538c2ecf20Sopenharmony_ci { 2548c2ecf20Sopenharmony_ci .procname = "soft_crypt", 2558c2ecf20Sopenharmony_ci .data = &hyperhold.enable_soft_crypt, 2568c2ecf20Sopenharmony_ci .maxlen = sizeof(hyperhold.enable_soft_crypt), 2578c2ecf20Sopenharmony_ci .mode = 0644, 2588c2ecf20Sopenharmony_ci .proc_handler = crypto_sysctl_handler, 2598c2ecf20Sopenharmony_ci .extra1 = SYSCTL_ZERO, 2608c2ecf20Sopenharmony_ci .extra2 = SYSCTL_ONE, 2618c2ecf20Sopenharmony_ci }, 2628c2ecf20Sopenharmony_ci {} 2638c2ecf20Sopenharmony_ci}; 2648c2ecf20Sopenharmony_cistatic struct ctl_table hp_kernel_table[] = { 2658c2ecf20Sopenharmony_ci { 2668c2ecf20Sopenharmony_ci .procname = "hyperhold", 2678c2ecf20Sopenharmony_ci .mode = 0555, 2688c2ecf20Sopenharmony_ci .child = hp_table, 2698c2ecf20Sopenharmony_ci }, 2708c2ecf20Sopenharmony_ci {} 2718c2ecf20Sopenharmony_ci}; 2728c2ecf20Sopenharmony_cistatic struct ctl_table hp_sys_table[] = { 2738c2ecf20Sopenharmony_ci { 2748c2ecf20Sopenharmony_ci .procname = "kernel", 2758c2ecf20Sopenharmony_ci .mode = 0555, 2768c2ecf20Sopenharmony_ci .child = hp_kernel_table, 2778c2ecf20Sopenharmony_ci }, 2788c2ecf20Sopenharmony_ci {} 2798c2ecf20Sopenharmony_ci}; 2808c2ecf20Sopenharmony_ci 2818c2ecf20Sopenharmony_cibool is_hyperhold_enable(void) 2828c2ecf20Sopenharmony_ci{ 2838c2ecf20Sopenharmony_ci return hyperhold.enable; 2848c2ecf20Sopenharmony_ci} 2858c2ecf20Sopenharmony_ci 2868c2ecf20Sopenharmony_cistatic int __init hyperhold_init(void) 2878c2ecf20Sopenharmony_ci{ 2888c2ecf20Sopenharmony_ci strcpy(hyperhold.device_name, HP_DFLT_DEVICE); 2898c2ecf20Sopenharmony_ci hyperhold.extent_size = HP_DFLT_EXT_SIZE; 2908c2ecf20Sopenharmony_ci hyperhold.enable_soft_crypt = 1; 2918c2ecf20Sopenharmony_ci mutex_init(&hyperhold.init_lock); 2928c2ecf20Sopenharmony_ci hp_sysctl_header = register_sysctl_table(hp_sys_table); 2938c2ecf20Sopenharmony_ci if (!hp_sysctl_header) { 2948c2ecf20Sopenharmony_ci pr_err("register hyperhold sysctl table failed!\n"); 2958c2ecf20Sopenharmony_ci return -EINVAL; 2968c2ecf20Sopenharmony_ci } 2978c2ecf20Sopenharmony_ci 2988c2ecf20Sopenharmony_ci return 0; 2998c2ecf20Sopenharmony_ci} 3008c2ecf20Sopenharmony_ci 3018c2ecf20Sopenharmony_cistatic void __exit hyperhold_exit(void) 3028c2ecf20Sopenharmony_ci{ 3038c2ecf20Sopenharmony_ci unregister_sysctl_table(hp_sysctl_header); 3048c2ecf20Sopenharmony_ci hyperhold_disable(true); 3058c2ecf20Sopenharmony_ci} 3068c2ecf20Sopenharmony_ci 3078c2ecf20Sopenharmony_cistatic struct hp_space *space_of(u32 eid) 3088c2ecf20Sopenharmony_ci{ 3098c2ecf20Sopenharmony_ci return &hyperhold.spc; 3108c2ecf20Sopenharmony_ci} 3118c2ecf20Sopenharmony_ci 3128c2ecf20Sopenharmony_ci/* replace this func for multi devices */ 3138c2ecf20Sopenharmony_cistatic struct hp_device *device_of(u32 eid) 3148c2ecf20Sopenharmony_ci{ 3158c2ecf20Sopenharmony_ci return &hyperhold.dev; 3168c2ecf20Sopenharmony_ci} 3178c2ecf20Sopenharmony_ci 3188c2ecf20Sopenharmony_ci/* replace this func for multi devices */ 3198c2ecf20Sopenharmony_ciu32 hyperhold_nr_extent(void) 3208c2ecf20Sopenharmony_ci{ 3218c2ecf20Sopenharmony_ci if (!CHECK_INITED) 3228c2ecf20Sopenharmony_ci return 0; 3238c2ecf20Sopenharmony_ci 3248c2ecf20Sopenharmony_ci return hyperhold.spc.nr_ext; 3258c2ecf20Sopenharmony_ci} 3268c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_nr_extent); 3278c2ecf20Sopenharmony_ci 3288c2ecf20Sopenharmony_ciu32 hyperhold_extent_size(u32 eid) 3298c2ecf20Sopenharmony_ci{ 3308c2ecf20Sopenharmony_ci struct hp_space *spc = NULL; 3318c2ecf20Sopenharmony_ci 3328c2ecf20Sopenharmony_ci if (!CHECK_INITED) 3338c2ecf20Sopenharmony_ci return 0; 3348c2ecf20Sopenharmony_ci spc = space_of(eid); 3358c2ecf20Sopenharmony_ci if (!CHECK(spc, "invalid eid %u!\n", eid)) 3368c2ecf20Sopenharmony_ci return 0; 3378c2ecf20Sopenharmony_ci 3388c2ecf20Sopenharmony_ci return spc->ext_size; 3398c2ecf20Sopenharmony_ci} 3408c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_extent_size); 3418c2ecf20Sopenharmony_ci 3428c2ecf20Sopenharmony_ci/* replace this func for multi devices */ 3438c2ecf20Sopenharmony_cilong hyperhold_address(u32 eid, u32 offset) 3448c2ecf20Sopenharmony_ci{ 3458c2ecf20Sopenharmony_ci struct hp_space *spc = NULL; 3468c2ecf20Sopenharmony_ci 3478c2ecf20Sopenharmony_ci if (!CHECK_INITED) 3488c2ecf20Sopenharmony_ci return -EINVAL; 3498c2ecf20Sopenharmony_ci spc = space_of(eid); 3508c2ecf20Sopenharmony_ci if (!CHECK(spc, "invalid eid %u!\n", eid)) 3518c2ecf20Sopenharmony_ci return -EINVAL; 3528c2ecf20Sopenharmony_ci if (!CHECK_BOUND(offset, 0, spc->ext_size - 1)) 3538c2ecf20Sopenharmony_ci return -EINVAL; 3548c2ecf20Sopenharmony_ci 3558c2ecf20Sopenharmony_ci return (u64)eid * spc->ext_size + offset; 3568c2ecf20Sopenharmony_ci} 3578c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_address); 3588c2ecf20Sopenharmony_ci 3598c2ecf20Sopenharmony_ci/* replace this func for multi devices */ 3608c2ecf20Sopenharmony_ciint hyperhold_addr_extent(u64 addr) 3618c2ecf20Sopenharmony_ci{ 3628c2ecf20Sopenharmony_ci struct hp_space *spc = NULL; 3638c2ecf20Sopenharmony_ci u32 eid; 3648c2ecf20Sopenharmony_ci 3658c2ecf20Sopenharmony_ci if (!CHECK_INITED) 3668c2ecf20Sopenharmony_ci return -EINVAL; 3678c2ecf20Sopenharmony_ci eid = div_u64(addr, hyperhold.spc.ext_size); 3688c2ecf20Sopenharmony_ci spc = space_of(eid); 3698c2ecf20Sopenharmony_ci if (!CHECK(spc, "invalid eid %u!\n", eid)) 3708c2ecf20Sopenharmony_ci return -EINVAL; 3718c2ecf20Sopenharmony_ci 3728c2ecf20Sopenharmony_ci return eid; 3738c2ecf20Sopenharmony_ci} 3748c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_addr_extent); 3758c2ecf20Sopenharmony_ci 3768c2ecf20Sopenharmony_ci/* replace this func for multi devices */ 3778c2ecf20Sopenharmony_ciint hyperhold_addr_offset(u64 addr) 3788c2ecf20Sopenharmony_ci{ 3798c2ecf20Sopenharmony_ci if (!CHECK_INITED) 3808c2ecf20Sopenharmony_ci return -EINVAL; 3818c2ecf20Sopenharmony_ci 3828c2ecf20Sopenharmony_ci return do_div(addr, hyperhold.spc.ext_size); 3838c2ecf20Sopenharmony_ci} 3848c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_addr_offset); 3858c2ecf20Sopenharmony_ci 3868c2ecf20Sopenharmony_ci/* replace this func for multi devices */ 3878c2ecf20Sopenharmony_ciint hyperhold_alloc_extent(void) 3888c2ecf20Sopenharmony_ci{ 3898c2ecf20Sopenharmony_ci if (!CHECK_ENABLE) 3908c2ecf20Sopenharmony_ci return -EINVAL; 3918c2ecf20Sopenharmony_ci 3928c2ecf20Sopenharmony_ci return alloc_eid(&hyperhold.spc); 3938c2ecf20Sopenharmony_ci} 3948c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_alloc_extent); 3958c2ecf20Sopenharmony_ci 3968c2ecf20Sopenharmony_civoid hyperhold_free_extent(u32 eid) 3978c2ecf20Sopenharmony_ci{ 3988c2ecf20Sopenharmony_ci struct hp_space *spc = NULL; 3998c2ecf20Sopenharmony_ci 4008c2ecf20Sopenharmony_ci if (!CHECK_INITED) 4018c2ecf20Sopenharmony_ci return; 4028c2ecf20Sopenharmony_ci spc = space_of(eid); 4038c2ecf20Sopenharmony_ci if (!CHECK(spc, "invalid eid %u!\n", eid)) 4048c2ecf20Sopenharmony_ci return; 4058c2ecf20Sopenharmony_ci 4068c2ecf20Sopenharmony_ci free_eid(spc, eid); 4078c2ecf20Sopenharmony_ci} 4088c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_free_extent); 4098c2ecf20Sopenharmony_ci 4108c2ecf20Sopenharmony_civoid hyperhold_should_free_extent(u32 eid) 4118c2ecf20Sopenharmony_ci{ 4128c2ecf20Sopenharmony_ci struct hpio *hpio = NULL; 4138c2ecf20Sopenharmony_ci struct hp_space *spc = NULL; 4148c2ecf20Sopenharmony_ci 4158c2ecf20Sopenharmony_ci if (!CHECK_INITED) 4168c2ecf20Sopenharmony_ci return; 4178c2ecf20Sopenharmony_ci spc = space_of(eid); 4188c2ecf20Sopenharmony_ci if (!CHECK(spc, "invalid eid %u", eid)) 4198c2ecf20Sopenharmony_ci return; 4208c2ecf20Sopenharmony_ci 4218c2ecf20Sopenharmony_ci hpio = hpio_get(eid); 4228c2ecf20Sopenharmony_ci if (!hpio) { 4238c2ecf20Sopenharmony_ci free_eid(spc, eid); 4248c2ecf20Sopenharmony_ci return; 4258c2ecf20Sopenharmony_ci } 4268c2ecf20Sopenharmony_ci hpio->free_extent = hyperhold_free_extent; 4278c2ecf20Sopenharmony_ci hpio_put(hpio); 4288c2ecf20Sopenharmony_ci} 4298c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_should_free_extent); 4308c2ecf20Sopenharmony_ci 4318c2ecf20Sopenharmony_ci/* 4328c2ecf20Sopenharmony_ci * alloc hpio struct for r/w extent at @eid, will fill hpio with new alloced 4338c2ecf20Sopenharmony_ci * pages if @new_page. @return NULL on fail. 4348c2ecf20Sopenharmony_ci */ 4358c2ecf20Sopenharmony_cistruct hpio *hyperhold_io_alloc(u32 eid, gfp_t gfp, unsigned int op, bool new_page) 4368c2ecf20Sopenharmony_ci{ 4378c2ecf20Sopenharmony_ci struct hpio *hpio = NULL; 4388c2ecf20Sopenharmony_ci struct hp_space *spc; 4398c2ecf20Sopenharmony_ci u32 nr_page; 4408c2ecf20Sopenharmony_ci 4418c2ecf20Sopenharmony_ci if (!CHECK_ENABLE) 4428c2ecf20Sopenharmony_ci return NULL; 4438c2ecf20Sopenharmony_ci spc = space_of(eid); 4448c2ecf20Sopenharmony_ci if (!CHECK(spc, "invalid eid %u!\n", eid)) 4458c2ecf20Sopenharmony_ci return NULL; 4468c2ecf20Sopenharmony_ci 4478c2ecf20Sopenharmony_ci nr_page = spc->ext_size / PAGE_SIZE; 4488c2ecf20Sopenharmony_ci hpio = hpio_alloc(nr_page, gfp, op, new_page); 4498c2ecf20Sopenharmony_ci if (!hpio) 4508c2ecf20Sopenharmony_ci goto err; 4518c2ecf20Sopenharmony_ci hpio->eid = eid; 4528c2ecf20Sopenharmony_ci 4538c2ecf20Sopenharmony_ci return hpio; 4548c2ecf20Sopenharmony_cierr: 4558c2ecf20Sopenharmony_ci hpio_free(hpio); 4568c2ecf20Sopenharmony_ci 4578c2ecf20Sopenharmony_ci return NULL; 4588c2ecf20Sopenharmony_ci} 4598c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_io_alloc); 4608c2ecf20Sopenharmony_ci 4618c2ecf20Sopenharmony_civoid hyperhold_io_free(struct hpio *hpio) 4628c2ecf20Sopenharmony_ci{ 4638c2ecf20Sopenharmony_ci if (!CHECK_INITED) 4648c2ecf20Sopenharmony_ci return; 4658c2ecf20Sopenharmony_ci if (!CHECK(hpio, "hpio is null!\n")) 4668c2ecf20Sopenharmony_ci return; 4678c2ecf20Sopenharmony_ci 4688c2ecf20Sopenharmony_ci hpio_free(hpio); 4698c2ecf20Sopenharmony_ci} 4708c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_io_free); 4718c2ecf20Sopenharmony_ci 4728c2ecf20Sopenharmony_ci/* 4738c2ecf20Sopenharmony_ci * find exist read hpio of the extent @eid in iotab and inc its refcnt, 4748c2ecf20Sopenharmony_ci * alloc a new hpio and insert it into iotab if there is no hpio for @eid 4758c2ecf20Sopenharmony_ci */ 4768c2ecf20Sopenharmony_cistruct hpio *hyperhold_io_get(u32 eid, gfp_t gfp, unsigned int op) 4778c2ecf20Sopenharmony_ci{ 4788c2ecf20Sopenharmony_ci struct hp_space *spc = NULL; 4798c2ecf20Sopenharmony_ci u32 nr_page; 4808c2ecf20Sopenharmony_ci 4818c2ecf20Sopenharmony_ci if (!CHECK_INITED) 4828c2ecf20Sopenharmony_ci return NULL; 4838c2ecf20Sopenharmony_ci spc = space_of(eid); 4848c2ecf20Sopenharmony_ci if (!CHECK(spc, "invalid eid %u", eid)) 4858c2ecf20Sopenharmony_ci return NULL; 4868c2ecf20Sopenharmony_ci 4878c2ecf20Sopenharmony_ci nr_page = spc->ext_size / PAGE_SIZE; 4888c2ecf20Sopenharmony_ci return hpio_get_alloc(eid, nr_page, gfp, op); 4898c2ecf20Sopenharmony_ci} 4908c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_io_get); 4918c2ecf20Sopenharmony_ci 4928c2ecf20Sopenharmony_cibool hyperhold_io_put(struct hpio *hpio) 4938c2ecf20Sopenharmony_ci{ 4948c2ecf20Sopenharmony_ci if (!CHECK_INITED) 4958c2ecf20Sopenharmony_ci return false; 4968c2ecf20Sopenharmony_ci if (!CHECK(hpio, "hpio is null!\n")) 4978c2ecf20Sopenharmony_ci return false; 4988c2ecf20Sopenharmony_ci 4998c2ecf20Sopenharmony_ci return hpio_put(hpio); 5008c2ecf20Sopenharmony_ci} 5018c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_io_put); 5028c2ecf20Sopenharmony_ci 5038c2ecf20Sopenharmony_ci/* 5048c2ecf20Sopenharmony_ci * notify all threads waiting for this hpio 5058c2ecf20Sopenharmony_ci */ 5068c2ecf20Sopenharmony_civoid hyperhold_io_complete(struct hpio *hpio) 5078c2ecf20Sopenharmony_ci{ 5088c2ecf20Sopenharmony_ci if (!CHECK_INITED) 5098c2ecf20Sopenharmony_ci return; 5108c2ecf20Sopenharmony_ci if (!CHECK(hpio, "hpio is null!\n")) 5118c2ecf20Sopenharmony_ci return; 5128c2ecf20Sopenharmony_ci 5138c2ecf20Sopenharmony_ci hpio_complete(hpio); 5148c2ecf20Sopenharmony_ci} 5158c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_io_complete); 5168c2ecf20Sopenharmony_ci 5178c2ecf20Sopenharmony_civoid hyperhold_io_wait(struct hpio *hpio) 5188c2ecf20Sopenharmony_ci{ 5198c2ecf20Sopenharmony_ci if (!CHECK_INITED) 5208c2ecf20Sopenharmony_ci return; 5218c2ecf20Sopenharmony_ci if (!CHECK(hpio, "hpio is null!\n")) 5228c2ecf20Sopenharmony_ci return; 5238c2ecf20Sopenharmony_ci 5248c2ecf20Sopenharmony_ci hpio_wait(hpio); 5258c2ecf20Sopenharmony_ci} 5268c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_io_wait); 5278c2ecf20Sopenharmony_ci 5288c2ecf20Sopenharmony_cibool hyperhold_io_success(struct hpio *hpio) 5298c2ecf20Sopenharmony_ci{ 5308c2ecf20Sopenharmony_ci if (!CHECK_INITED) 5318c2ecf20Sopenharmony_ci return false; 5328c2ecf20Sopenharmony_ci if (!CHECK(hpio, "hpio is null!\n")) 5338c2ecf20Sopenharmony_ci return false; 5348c2ecf20Sopenharmony_ci 5358c2ecf20Sopenharmony_ci return hpio_get_state(hpio) == HPIO_DONE; 5368c2ecf20Sopenharmony_ci} 5378c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_io_success); 5388c2ecf20Sopenharmony_ci 5398c2ecf20Sopenharmony_ciint hyperhold_io_extent(struct hpio *hpio) 5408c2ecf20Sopenharmony_ci{ 5418c2ecf20Sopenharmony_ci if (!CHECK_INITED) 5428c2ecf20Sopenharmony_ci return -EINVAL; 5438c2ecf20Sopenharmony_ci if (!CHECK(hpio, "hpio is null!\n")) 5448c2ecf20Sopenharmony_ci return -EINVAL; 5458c2ecf20Sopenharmony_ci 5468c2ecf20Sopenharmony_ci return hpio->eid; 5478c2ecf20Sopenharmony_ci} 5488c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_io_extent); 5498c2ecf20Sopenharmony_ci 5508c2ecf20Sopenharmony_ciint hyperhold_io_operate(struct hpio *hpio) 5518c2ecf20Sopenharmony_ci{ 5528c2ecf20Sopenharmony_ci if (!CHECK_INITED) 5538c2ecf20Sopenharmony_ci return -EINVAL; 5548c2ecf20Sopenharmony_ci if (!CHECK(hpio, "hpio is null!\n")) 5558c2ecf20Sopenharmony_ci return -EINVAL; 5568c2ecf20Sopenharmony_ci 5578c2ecf20Sopenharmony_ci return hpio->op; 5588c2ecf20Sopenharmony_ci} 5598c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_io_operate); 5608c2ecf20Sopenharmony_ci 5618c2ecf20Sopenharmony_cistruct page *hyperhold_io_page(struct hpio *hpio, u32 index) 5628c2ecf20Sopenharmony_ci{ 5638c2ecf20Sopenharmony_ci if (!CHECK_INITED) 5648c2ecf20Sopenharmony_ci return NULL; 5658c2ecf20Sopenharmony_ci if (!CHECK(hpio, "hpio is null!\n")) 5668c2ecf20Sopenharmony_ci return NULL; 5678c2ecf20Sopenharmony_ci if (!CHECK_BOUND(index, 0, hpio->nr_page - 1)) 5688c2ecf20Sopenharmony_ci return NULL; 5698c2ecf20Sopenharmony_ci 5708c2ecf20Sopenharmony_ci return hpio->pages[index]; 5718c2ecf20Sopenharmony_ci} 5728c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_io_page); 5738c2ecf20Sopenharmony_ci 5748c2ecf20Sopenharmony_cibool hyperhold_io_add_page(struct hpio *hpio, u32 index, struct page *page) 5758c2ecf20Sopenharmony_ci{ 5768c2ecf20Sopenharmony_ci if (!CHECK_INITED) 5778c2ecf20Sopenharmony_ci return false; 5788c2ecf20Sopenharmony_ci if (!CHECK(hpio, "hpio is null!\n")) 5798c2ecf20Sopenharmony_ci return false; 5808c2ecf20Sopenharmony_ci if (!CHECK(page, "page is null!\n")) 5818c2ecf20Sopenharmony_ci return false; 5828c2ecf20Sopenharmony_ci if (!CHECK_BOUND(index, 0, hpio->nr_page - 1)) 5838c2ecf20Sopenharmony_ci return false; 5848c2ecf20Sopenharmony_ci 5858c2ecf20Sopenharmony_ci get_page(page); 5868c2ecf20Sopenharmony_ci atomic64_add(PAGE_SIZE, &mem_used); 5878c2ecf20Sopenharmony_ci BUG_ON(hpio->pages[index]); 5888c2ecf20Sopenharmony_ci hpio->pages[index] = page; 5898c2ecf20Sopenharmony_ci 5908c2ecf20Sopenharmony_ci return true; 5918c2ecf20Sopenharmony_ci} 5928c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_io_add_page); 5938c2ecf20Sopenharmony_ci 5948c2ecf20Sopenharmony_ciu32 hyperhold_io_nr_page(struct hpio *hpio) 5958c2ecf20Sopenharmony_ci{ 5968c2ecf20Sopenharmony_ci if (!CHECK_INITED) 5978c2ecf20Sopenharmony_ci return 0; 5988c2ecf20Sopenharmony_ci if (!CHECK(hpio, "hpio is null!\n")) 5998c2ecf20Sopenharmony_ci return 0; 6008c2ecf20Sopenharmony_ci 6018c2ecf20Sopenharmony_ci return hpio->nr_page; 6028c2ecf20Sopenharmony_ci} 6038c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_io_nr_page); 6048c2ecf20Sopenharmony_ci 6058c2ecf20Sopenharmony_civoid *hyperhold_io_private(struct hpio *hpio) 6068c2ecf20Sopenharmony_ci{ 6078c2ecf20Sopenharmony_ci if (!CHECK_INITED) 6088c2ecf20Sopenharmony_ci return NULL; 6098c2ecf20Sopenharmony_ci if (!CHECK(hpio, "hpio is null!\n")) 6108c2ecf20Sopenharmony_ci return NULL; 6118c2ecf20Sopenharmony_ci 6128c2ecf20Sopenharmony_ci return hpio->private; 6138c2ecf20Sopenharmony_ci} 6148c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_io_private); 6158c2ecf20Sopenharmony_ci 6168c2ecf20Sopenharmony_cistatic struct page *get_encrypted_page(struct hp_device *dev, struct page *page, unsigned int op) 6178c2ecf20Sopenharmony_ci{ 6188c2ecf20Sopenharmony_ci struct page *encrypted_page = NULL; 6198c2ecf20Sopenharmony_ci 6208c2ecf20Sopenharmony_ci if (!dev->ctfm) { 6218c2ecf20Sopenharmony_ci encrypted_page = page; 6228c2ecf20Sopenharmony_ci get_page(encrypted_page); 6238c2ecf20Sopenharmony_ci goto out; 6248c2ecf20Sopenharmony_ci } 6258c2ecf20Sopenharmony_ci 6268c2ecf20Sopenharmony_ci encrypted_page = alloc_page(GFP_NOIO); 6278c2ecf20Sopenharmony_ci if (!encrypted_page) { 6288c2ecf20Sopenharmony_ci pr_err("alloc encrypted page failed!\n"); 6298c2ecf20Sopenharmony_ci goto out; 6308c2ecf20Sopenharmony_ci } 6318c2ecf20Sopenharmony_ci encrypted_page->index = page->index; 6328c2ecf20Sopenharmony_ci 6338c2ecf20Sopenharmony_ci /* just alloc a new page for read */ 6348c2ecf20Sopenharmony_ci if (!op_is_write(op)) 6358c2ecf20Sopenharmony_ci goto out; 6368c2ecf20Sopenharmony_ci 6378c2ecf20Sopenharmony_ci /* encrypt page for write */ 6388c2ecf20Sopenharmony_ci if (soft_crypt_page(dev->ctfm, encrypted_page, page, HP_DEV_ENCRYPT)) { 6398c2ecf20Sopenharmony_ci put_page(encrypted_page); 6408c2ecf20Sopenharmony_ci encrypted_page = NULL; 6418c2ecf20Sopenharmony_ci } 6428c2ecf20Sopenharmony_ciout: 6438c2ecf20Sopenharmony_ci return encrypted_page; 6448c2ecf20Sopenharmony_ci} 6458c2ecf20Sopenharmony_ci 6468c2ecf20Sopenharmony_cistatic void put_encrypted_pages(struct bio *bio) 6478c2ecf20Sopenharmony_ci{ 6488c2ecf20Sopenharmony_ci struct bio_vec *bv = NULL; 6498c2ecf20Sopenharmony_ci struct bvec_iter_all iter; 6508c2ecf20Sopenharmony_ci 6518c2ecf20Sopenharmony_ci bio_for_each_segment_all(bv, bio, iter) 6528c2ecf20Sopenharmony_ci put_page(bv->bv_page); 6538c2ecf20Sopenharmony_ci} 6548c2ecf20Sopenharmony_ci 6558c2ecf20Sopenharmony_cistatic void hp_endio_work(struct work_struct *work) 6568c2ecf20Sopenharmony_ci{ 6578c2ecf20Sopenharmony_ci struct hpio *hpio = container_of(work, struct hpio, endio_work); 6588c2ecf20Sopenharmony_ci struct hp_device *dev = NULL; 6598c2ecf20Sopenharmony_ci struct bio_vec *bv = NULL; 6608c2ecf20Sopenharmony_ci struct bvec_iter_all iter; 6618c2ecf20Sopenharmony_ci struct page *page = NULL; 6628c2ecf20Sopenharmony_ci u32 ext_size; 6638c2ecf20Sopenharmony_ci sector_t sec; 6648c2ecf20Sopenharmony_ci int i; 6658c2ecf20Sopenharmony_ci 6668c2ecf20Sopenharmony_ci if (op_is_write(hpio->op)) 6678c2ecf20Sopenharmony_ci goto endio; 6688c2ecf20Sopenharmony_ci ext_size = space_of(hpio->eid)->ext_size; 6698c2ecf20Sopenharmony_ci dev = device_of(hpio->eid); 6708c2ecf20Sopenharmony_ci sec = hpio->eid * ext_size / dev->sec_size; 6718c2ecf20Sopenharmony_ci i = 0; 6728c2ecf20Sopenharmony_ci bio_for_each_segment_all(bv, hpio->bio, iter) { 6738c2ecf20Sopenharmony_ci page = bv->bv_page; 6748c2ecf20Sopenharmony_ci BUG_ON(i >= hpio->nr_page); 6758c2ecf20Sopenharmony_ci BUG_ON(!hpio->pages[i]); 6768c2ecf20Sopenharmony_ci if (dev->ctfm) 6778c2ecf20Sopenharmony_ci BUG_ON(soft_crypt_page(dev->ctfm, hpio->pages[i], page, HP_DEV_DECRYPT)); 6788c2ecf20Sopenharmony_ci sec += PAGE_SIZE / dev->sec_size; 6798c2ecf20Sopenharmony_ci i++; 6808c2ecf20Sopenharmony_ci } 6818c2ecf20Sopenharmony_ciendio: 6828c2ecf20Sopenharmony_ci put_encrypted_pages(hpio->bio); 6838c2ecf20Sopenharmony_ci bio_put(hpio->bio); 6848c2ecf20Sopenharmony_ci if (hpio->endio) 6858c2ecf20Sopenharmony_ci hpio->endio(hpio); 6868c2ecf20Sopenharmony_ci} 6878c2ecf20Sopenharmony_ci 6888c2ecf20Sopenharmony_cistatic void hpio_endio(struct bio *bio) 6898c2ecf20Sopenharmony_ci{ 6908c2ecf20Sopenharmony_ci struct hpio *hpio = bio->bi_private; 6918c2ecf20Sopenharmony_ci struct workqueue_struct *wq = NULL; 6928c2ecf20Sopenharmony_ci 6938c2ecf20Sopenharmony_ci pr_info("hpio %p for eid %u returned %d.\n", 6948c2ecf20Sopenharmony_ci hpio, hpio->eid, bio->bi_status); 6958c2ecf20Sopenharmony_ci hpio_set_state(hpio, bio->bi_status ? HPIO_FAIL : HPIO_DONE); 6968c2ecf20Sopenharmony_ci wq = op_is_write(hpio->op) ? hyperhold.write_wq : hyperhold.read_wq; 6978c2ecf20Sopenharmony_ci queue_work(wq, &hpio->endio_work); 6988c2ecf20Sopenharmony_ci atomic64_sub(sizeof(struct bio), &mem_used); 6998c2ecf20Sopenharmony_ci} 7008c2ecf20Sopenharmony_ci 7018c2ecf20Sopenharmony_cistatic int hpio_submit(struct hpio *hpio) 7028c2ecf20Sopenharmony_ci{ 7038c2ecf20Sopenharmony_ci struct hp_device *dev = NULL; 7048c2ecf20Sopenharmony_ci struct bio *bio = NULL; 7058c2ecf20Sopenharmony_ci struct page *page = NULL; 7068c2ecf20Sopenharmony_ci u32 ext_size; 7078c2ecf20Sopenharmony_ci sector_t sec; 7088c2ecf20Sopenharmony_ci int i; 7098c2ecf20Sopenharmony_ci 7108c2ecf20Sopenharmony_ci bio = bio_alloc(GFP_NOIO, BIO_MAX_PAGES); 7118c2ecf20Sopenharmony_ci if (!bio) { 7128c2ecf20Sopenharmony_ci pr_err("bio alloc failed!\n"); 7138c2ecf20Sopenharmony_ci return -ENOMEM; 7148c2ecf20Sopenharmony_ci } 7158c2ecf20Sopenharmony_ci atomic64_add(sizeof(struct bio), &mem_used); 7168c2ecf20Sopenharmony_ci 7178c2ecf20Sopenharmony_ci dev = device_of(hpio->eid); 7188c2ecf20Sopenharmony_ci bio_set_op_attrs(bio, hpio->op, 0); 7198c2ecf20Sopenharmony_ci bio_set_dev(bio, dev->bdev); 7208c2ecf20Sopenharmony_ci 7218c2ecf20Sopenharmony_ci ext_size = space_of(hpio->eid)->ext_size; 7228c2ecf20Sopenharmony_ci sec = div_u64((u64)hpio->eid * ext_size, dev->sec_size); 7238c2ecf20Sopenharmony_ci bio->bi_iter.bi_sector = sec; 7248c2ecf20Sopenharmony_ci for (i = 0; i < hpio->nr_page; i++) { 7258c2ecf20Sopenharmony_ci if (!hpio->pages[i]) 7268c2ecf20Sopenharmony_ci break; 7278c2ecf20Sopenharmony_ci hpio->pages[i]->index = sec; 7288c2ecf20Sopenharmony_ci page = get_encrypted_page(dev, hpio->pages[i], hpio->op); 7298c2ecf20Sopenharmony_ci if (!page) 7308c2ecf20Sopenharmony_ci goto err; 7318c2ecf20Sopenharmony_ci if (!bio_add_page(bio, page, PAGE_SIZE, 0)) { 7328c2ecf20Sopenharmony_ci put_page(page); 7338c2ecf20Sopenharmony_ci goto err; 7348c2ecf20Sopenharmony_ci } 7358c2ecf20Sopenharmony_ci sec += PAGE_SIZE / dev->sec_size; 7368c2ecf20Sopenharmony_ci } 7378c2ecf20Sopenharmony_ci 7388c2ecf20Sopenharmony_ci if (dev->blk_key) 7398c2ecf20Sopenharmony_ci inline_crypt_bio(dev->blk_key, bio); 7408c2ecf20Sopenharmony_ci bio->bi_private = hpio; 7418c2ecf20Sopenharmony_ci bio->bi_end_io = hpio_endio; 7428c2ecf20Sopenharmony_ci hpio->bio = bio; 7438c2ecf20Sopenharmony_ci submit_bio(bio); 7448c2ecf20Sopenharmony_ci pr_info("submit hpio %p for eid %u.\n", hpio, hpio->eid); 7458c2ecf20Sopenharmony_ci 7468c2ecf20Sopenharmony_ci return 0; 7478c2ecf20Sopenharmony_cierr: 7488c2ecf20Sopenharmony_ci put_encrypted_pages(bio); 7498c2ecf20Sopenharmony_ci bio_put(bio); 7508c2ecf20Sopenharmony_ci atomic64_sub(sizeof(struct bio), &mem_used); 7518c2ecf20Sopenharmony_ci return -EIO; 7528c2ecf20Sopenharmony_ci} 7538c2ecf20Sopenharmony_ci 7548c2ecf20Sopenharmony_cistatic int rw_extent_async(struct hpio *hpio, hp_endio endio, void *priv, unsigned int op) 7558c2ecf20Sopenharmony_ci{ 7568c2ecf20Sopenharmony_ci int ret = 0; 7578c2ecf20Sopenharmony_ci 7588c2ecf20Sopenharmony_ci if (!hpio_change_state(hpio, HPIO_INIT, HPIO_SUBMIT)) 7598c2ecf20Sopenharmony_ci return -EAGAIN; 7608c2ecf20Sopenharmony_ci 7618c2ecf20Sopenharmony_ci hpio->private = priv; 7628c2ecf20Sopenharmony_ci hpio->endio = endio; 7638c2ecf20Sopenharmony_ci INIT_WORK(&hpio->endio_work, hp_endio_work); 7648c2ecf20Sopenharmony_ci 7658c2ecf20Sopenharmony_ci ret = hpio_submit(hpio); 7668c2ecf20Sopenharmony_ci if (ret) { 7678c2ecf20Sopenharmony_ci hpio_set_state(hpio, HPIO_FAIL); 7688c2ecf20Sopenharmony_ci hpio_complete(hpio); 7698c2ecf20Sopenharmony_ci } 7708c2ecf20Sopenharmony_ci 7718c2ecf20Sopenharmony_ci return ret; 7728c2ecf20Sopenharmony_ci} 7738c2ecf20Sopenharmony_ci 7748c2ecf20Sopenharmony_ciint hyperhold_write_async(struct hpio *hpio, hp_endio endio, void *priv) 7758c2ecf20Sopenharmony_ci{ 7768c2ecf20Sopenharmony_ci if (!CHECK_ENABLE) { 7778c2ecf20Sopenharmony_ci hpio_set_state(hpio, HPIO_FAIL); 7788c2ecf20Sopenharmony_ci hpio_complete(hpio); 7798c2ecf20Sopenharmony_ci return -EINVAL; 7808c2ecf20Sopenharmony_ci } 7818c2ecf20Sopenharmony_ci 7828c2ecf20Sopenharmony_ci BUG_ON(!op_is_write(hpio->op)); 7838c2ecf20Sopenharmony_ci 7848c2ecf20Sopenharmony_ci return rw_extent_async(hpio, endio, priv, REQ_OP_WRITE); 7858c2ecf20Sopenharmony_ci} 7868c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_write_async); 7878c2ecf20Sopenharmony_ci 7888c2ecf20Sopenharmony_ciint hyperhold_read_async(struct hpio *hpio, hp_endio endio, void *priv) 7898c2ecf20Sopenharmony_ci{ 7908c2ecf20Sopenharmony_ci if (!CHECK_INITED) { 7918c2ecf20Sopenharmony_ci hpio_set_state(hpio, HPIO_FAIL); 7928c2ecf20Sopenharmony_ci hpio_complete(hpio); 7938c2ecf20Sopenharmony_ci return -EINVAL; 7948c2ecf20Sopenharmony_ci } 7958c2ecf20Sopenharmony_ci 7968c2ecf20Sopenharmony_ci if (op_is_write(hpio->op)) 7978c2ecf20Sopenharmony_ci return -EAGAIN; 7988c2ecf20Sopenharmony_ci 7998c2ecf20Sopenharmony_ci return rw_extent_async(hpio, endio, priv, REQ_OP_READ); 8008c2ecf20Sopenharmony_ci} 8018c2ecf20Sopenharmony_ciEXPORT_SYMBOL(hyperhold_read_async); 8028c2ecf20Sopenharmony_ci 8038c2ecf20Sopenharmony_cimodule_init(hyperhold_init) 8048c2ecf20Sopenharmony_cimodule_exit(hyperhold_exit) 805