Skip to content

Commit be82a89

Browse files
Stanley Zhangaxboe
authored andcommitted
ublk: implement integrity user copy
Add a function ublk_copy_user_integrity() to copy integrity information between a request and a user iov_iter. This mirrors the existing ublk_copy_user_pages() but operates on request integrity data instead of regular data. Check UBLKSRV_IO_INTEGRITY_FLAG in iocb->ki_pos in ublk_user_copy() to choose between copying data or integrity data. [csander: change offset units from data bytes to integrity data bytes, fix CONFIG_BLK_DEV_INTEGRITY=n build, rebase on user copy refactor] Signed-off-by: Stanley Zhang <stazhang@purestorage.com> Signed-off-by: Caleb Sander Mateos <csander@purestorage.com> Reviewed-by: Ming Lei <ming.lei@redhat.com> Signed-off-by: Jens Axboe <axboe@kernel.dk>
1 parent fd5a005 commit be82a89

2 files changed

Lines changed: 55 additions & 2 deletions

File tree

drivers/block/ublk_drv.c

Lines changed: 51 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1040,6 +1040,33 @@ static size_t ublk_copy_user_pages(const struct request *req,
10401040
return done;
10411041
}
10421042

1043+
#ifdef CONFIG_BLK_DEV_INTEGRITY
1044+
static size_t ublk_copy_user_integrity(const struct request *req,
1045+
unsigned offset, struct iov_iter *uiter, int dir)
1046+
{
1047+
size_t done = 0;
1048+
struct bio *bio = req->bio;
1049+
struct bvec_iter iter;
1050+
struct bio_vec iv;
1051+
1052+
if (!blk_integrity_rq(req))
1053+
return 0;
1054+
1055+
bio_for_each_integrity_vec(iv, bio, iter) {
1056+
if (!ublk_copy_user_bvec(&iv, &offset, uiter, dir, &done))
1057+
break;
1058+
}
1059+
1060+
return done;
1061+
}
1062+
#else /* #ifdef CONFIG_BLK_DEV_INTEGRITY */
1063+
static size_t ublk_copy_user_integrity(const struct request *req,
1064+
unsigned offset, struct iov_iter *uiter, int dir)
1065+
{
1066+
return 0;
1067+
}
1068+
#endif /* #ifdef CONFIG_BLK_DEV_INTEGRITY */
1069+
10431070
static inline bool ublk_need_map_req(const struct request *req)
10441071
{
10451072
return ublk_rq_has_data(req) && req_op(req) == REQ_OP_WRITE;
@@ -2668,6 +2695,8 @@ ublk_user_copy(struct kiocb *iocb, struct iov_iter *iter, int dir)
26682695
struct ublk_queue *ubq;
26692696
struct request *req;
26702697
struct ublk_io *io;
2698+
unsigned data_len;
2699+
bool is_integrity;
26712700
size_t buf_off;
26722701
u16 tag, q_id;
26732702
ssize_t ret;
@@ -2681,6 +2710,10 @@ ublk_user_copy(struct kiocb *iocb, struct iov_iter *iter, int dir)
26812710
tag = ublk_pos_to_tag(iocb->ki_pos);
26822711
q_id = ublk_pos_to_hwq(iocb->ki_pos);
26832712
buf_off = ublk_pos_to_buf_off(iocb->ki_pos);
2713+
is_integrity = !!(iocb->ki_pos & UBLKSRV_IO_INTEGRITY_FLAG);
2714+
2715+
if (unlikely(!ublk_dev_support_integrity(ub) && is_integrity))
2716+
return -EINVAL;
26842717

26852718
if (q_id >= ub->dev_info.nr_hw_queues)
26862719
return -EINVAL;
@@ -2697,7 +2730,14 @@ ublk_user_copy(struct kiocb *iocb, struct iov_iter *iter, int dir)
26972730
if (!req)
26982731
return -EINVAL;
26992732

2700-
if (buf_off > blk_rq_bytes(req)) {
2733+
if (is_integrity) {
2734+
struct blk_integrity *bi = &req->q->limits.integrity;
2735+
2736+
data_len = bio_integrity_bytes(bi, blk_rq_sectors(req));
2737+
} else {
2738+
data_len = blk_rq_bytes(req);
2739+
}
2740+
if (buf_off > data_len) {
27012741
ret = -EINVAL;
27022742
goto out;
27032743
}
@@ -2707,7 +2747,10 @@ ublk_user_copy(struct kiocb *iocb, struct iov_iter *iter, int dir)
27072747
goto out;
27082748
}
27092749

2710-
ret = ublk_copy_user_pages(req, buf_off, iter, dir);
2750+
if (is_integrity)
2751+
ret = ublk_copy_user_integrity(req, buf_off, iter, dir);
2752+
else
2753+
ret = ublk_copy_user_pages(req, buf_off, iter, dir);
27112754

27122755
out:
27132756
ublk_put_req_ref(io, req);
@@ -3948,6 +3991,12 @@ static int __init ublk_init(void)
39483991

39493992
BUILD_BUG_ON((u64)UBLKSRV_IO_BUF_OFFSET +
39503993
UBLKSRV_IO_BUF_TOTAL_SIZE < UBLKSRV_IO_BUF_OFFSET);
3994+
/*
3995+
* Ensure UBLKSRV_IO_BUF_OFFSET + UBLKSRV_IO_BUF_TOTAL_SIZE
3996+
* doesn't overflow into UBLKSRV_IO_INTEGRITY_FLAG
3997+
*/
3998+
BUILD_BUG_ON(UBLKSRV_IO_BUF_OFFSET + UBLKSRV_IO_BUF_TOTAL_SIZE >=
3999+
UBLKSRV_IO_INTEGRITY_FLAG);
39514000
BUILD_BUG_ON(sizeof(struct ublk_auto_buf_reg) != 8);
39524001

39534002
init_waitqueue_head(&ublk_idr_wq);

include/uapi/linux/ublk_cmd.h

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,10 @@
134134
#define UBLKSRV_IO_BUF_TOTAL_BITS (UBLK_QID_OFF + UBLK_QID_BITS)
135135
#define UBLKSRV_IO_BUF_TOTAL_SIZE (1ULL << UBLKSRV_IO_BUF_TOTAL_BITS)
136136

137+
/* Copy to/from request integrity buffer instead of data buffer */
138+
#define UBLK_INTEGRITY_FLAG_OFF 62
139+
#define UBLKSRV_IO_INTEGRITY_FLAG (1ULL << UBLK_INTEGRITY_FLAG_OFF)
140+
137141
/*
138142
* ublk server can register data buffers for incoming I/O requests with a sparse
139143
* io_uring buffer table. The request buffer can then be used as the data buffer

0 commit comments

Comments
 (0)