]>
Commit | Line | Data |
---|---|---|
03c8efc1 HX |
1 | /* |
2 | * af_alg: User-space algorithm interface | |
3 | * | |
4 | * This file provides the user-space API for algorithms. | |
5 | * | |
6 | * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au> | |
7 | * | |
8 | * This program is free software; you can redistribute it and/or modify it | |
9 | * under the terms of the GNU General Public License as published by the Free | |
10 | * Software Foundation; either version 2 of the License, or (at your option) | |
11 | * any later version. | |
12 | * | |
13 | */ | |
14 | ||
60063497 | 15 | #include <linux/atomic.h> |
03c8efc1 HX |
16 | #include <crypto/if_alg.h> |
17 | #include <linux/crypto.h> | |
18 | #include <linux/init.h> | |
19 | #include <linux/kernel.h> | |
20 | #include <linux/list.h> | |
21 | #include <linux/module.h> | |
22 | #include <linux/net.h> | |
23 | #include <linux/rwsem.h> | |
4c63f83c | 24 | #include <linux/security.h> |
03c8efc1 HX |
25 | |
26 | struct alg_type_list { | |
27 | const struct af_alg_type *type; | |
28 | struct list_head list; | |
29 | }; | |
30 | ||
06869524 | 31 | static atomic_long_t alg_memory_allocated; |
03c8efc1 HX |
32 | |
33 | static struct proto alg_proto = { | |
34 | .name = "ALG", | |
35 | .owner = THIS_MODULE, | |
36 | .memory_allocated = &alg_memory_allocated, | |
37 | .obj_size = sizeof(struct alg_sock), | |
38 | }; | |
39 | ||
40 | static LIST_HEAD(alg_types); | |
41 | static DECLARE_RWSEM(alg_types_sem); | |
42 | ||
43 | static const struct af_alg_type *alg_get_type(const char *name) | |
44 | { | |
45 | const struct af_alg_type *type = ERR_PTR(-ENOENT); | |
46 | struct alg_type_list *node; | |
47 | ||
48 | down_read(&alg_types_sem); | |
49 | list_for_each_entry(node, &alg_types, list) { | |
50 | if (strcmp(node->type->name, name)) | |
51 | continue; | |
52 | ||
53 | if (try_module_get(node->type->owner)) | |
54 | type = node->type; | |
55 | break; | |
56 | } | |
57 | up_read(&alg_types_sem); | |
58 | ||
59 | return type; | |
60 | } | |
61 | ||
62 | int af_alg_register_type(const struct af_alg_type *type) | |
63 | { | |
64 | struct alg_type_list *node; | |
65 | int err = -EEXIST; | |
66 | ||
67 | down_write(&alg_types_sem); | |
68 | list_for_each_entry(node, &alg_types, list) { | |
69 | if (!strcmp(node->type->name, type->name)) | |
70 | goto unlock; | |
71 | } | |
72 | ||
73 | node = kmalloc(sizeof(*node), GFP_KERNEL); | |
74 | err = -ENOMEM; | |
75 | if (!node) | |
76 | goto unlock; | |
77 | ||
78 | type->ops->owner = THIS_MODULE; | |
37766586 HX |
79 | if (type->ops_nokey) |
80 | type->ops_nokey->owner = THIS_MODULE; | |
03c8efc1 HX |
81 | node->type = type; |
82 | list_add(&node->list, &alg_types); | |
83 | err = 0; | |
84 | ||
85 | unlock: | |
86 | up_write(&alg_types_sem); | |
87 | ||
88 | return err; | |
89 | } | |
90 | EXPORT_SYMBOL_GPL(af_alg_register_type); | |
91 | ||
92 | int af_alg_unregister_type(const struct af_alg_type *type) | |
93 | { | |
94 | struct alg_type_list *node; | |
95 | int err = -ENOENT; | |
96 | ||
97 | down_write(&alg_types_sem); | |
98 | list_for_each_entry(node, &alg_types, list) { | |
99 | if (strcmp(node->type->name, type->name)) | |
100 | continue; | |
101 | ||
102 | list_del(&node->list); | |
103 | kfree(node); | |
104 | err = 0; | |
105 | break; | |
106 | } | |
107 | up_write(&alg_types_sem); | |
108 | ||
109 | return err; | |
110 | } | |
111 | EXPORT_SYMBOL_GPL(af_alg_unregister_type); | |
112 | ||
113 | static void alg_do_release(const struct af_alg_type *type, void *private) | |
114 | { | |
115 | if (!type) | |
116 | return; | |
117 | ||
118 | type->release(private); | |
119 | module_put(type->owner); | |
120 | } | |
121 | ||
122 | int af_alg_release(struct socket *sock) | |
123 | { | |
124 | if (sock->sk) | |
125 | sock_put(sock->sk); | |
126 | return 0; | |
127 | } | |
128 | EXPORT_SYMBOL_GPL(af_alg_release); | |
129 | ||
c840ac6a HX |
130 | void af_alg_release_parent(struct sock *sk) |
131 | { | |
132 | struct alg_sock *ask = alg_sk(sk); | |
133 | bool last; | |
134 | ||
135 | sk = ask->parent; | |
6a935170 HX |
136 | |
137 | if (ask->nokey_refcnt && !ask->refcnt) { | |
138 | sock_put(sk); | |
139 | return; | |
140 | } | |
141 | ||
c840ac6a HX |
142 | ask = alg_sk(sk); |
143 | ||
144 | lock_sock(sk); | |
145 | last = !--ask->refcnt; | |
146 | release_sock(sk); | |
147 | ||
148 | if (last) | |
149 | sock_put(sk); | |
150 | } | |
151 | EXPORT_SYMBOL_GPL(af_alg_release_parent); | |
152 | ||
03c8efc1 HX |
153 | static int alg_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len) |
154 | { | |
15539de5 | 155 | const u32 forbidden = CRYPTO_ALG_INTERNAL; |
03c8efc1 HX |
156 | struct sock *sk = sock->sk; |
157 | struct alg_sock *ask = alg_sk(sk); | |
158 | struct sockaddr_alg *sa = (void *)uaddr; | |
159 | const struct af_alg_type *type; | |
160 | void *private; | |
c840ac6a | 161 | int err; |
03c8efc1 HX |
162 | |
163 | if (sock->state == SS_CONNECTED) | |
164 | return -EINVAL; | |
165 | ||
166 | if (addr_len != sizeof(*sa)) | |
167 | return -EINVAL; | |
168 | ||
169 | sa->salg_type[sizeof(sa->salg_type) - 1] = 0; | |
170 | sa->salg_name[sizeof(sa->salg_name) - 1] = 0; | |
171 | ||
172 | type = alg_get_type(sa->salg_type); | |
173 | if (IS_ERR(type) && PTR_ERR(type) == -ENOENT) { | |
174 | request_module("algif-%s", sa->salg_type); | |
175 | type = alg_get_type(sa->salg_type); | |
176 | } | |
177 | ||
178 | if (IS_ERR(type)) | |
179 | return PTR_ERR(type); | |
180 | ||
15539de5 HX |
181 | private = type->bind(sa->salg_name, |
182 | sa->salg_feat & ~forbidden, | |
183 | sa->salg_mask & ~forbidden); | |
03c8efc1 HX |
184 | if (IS_ERR(private)) { |
185 | module_put(type->owner); | |
186 | return PTR_ERR(private); | |
187 | } | |
188 | ||
c840ac6a | 189 | err = -EBUSY; |
03c8efc1 | 190 | lock_sock(sk); |
c840ac6a HX |
191 | if (ask->refcnt) |
192 | goto unlock; | |
03c8efc1 HX |
193 | |
194 | swap(ask->type, type); | |
195 | swap(ask->private, private); | |
196 | ||
c840ac6a HX |
197 | err = 0; |
198 | ||
199 | unlock: | |
03c8efc1 HX |
200 | release_sock(sk); |
201 | ||
202 | alg_do_release(type, private); | |
203 | ||
c840ac6a | 204 | return err; |
03c8efc1 HX |
205 | } |
206 | ||
207 | static int alg_setkey(struct sock *sk, char __user *ukey, | |
208 | unsigned int keylen) | |
209 | { | |
210 | struct alg_sock *ask = alg_sk(sk); | |
211 | const struct af_alg_type *type = ask->type; | |
212 | u8 *key; | |
213 | int err; | |
214 | ||
215 | key = sock_kmalloc(sk, keylen, GFP_KERNEL); | |
216 | if (!key) | |
217 | return -ENOMEM; | |
218 | ||
219 | err = -EFAULT; | |
220 | if (copy_from_user(key, ukey, keylen)) | |
221 | goto out; | |
222 | ||
223 | err = type->setkey(ask->private, key, keylen); | |
224 | ||
225 | out: | |
ad202c8c | 226 | sock_kzfree_s(sk, key, keylen); |
03c8efc1 HX |
227 | |
228 | return err; | |
229 | } | |
230 | ||
231 | static int alg_setsockopt(struct socket *sock, int level, int optname, | |
232 | char __user *optval, unsigned int optlen) | |
233 | { | |
234 | struct sock *sk = sock->sk; | |
235 | struct alg_sock *ask = alg_sk(sk); | |
236 | const struct af_alg_type *type; | |
c840ac6a | 237 | int err = -EBUSY; |
03c8efc1 HX |
238 | |
239 | lock_sock(sk); | |
c840ac6a HX |
240 | if (ask->refcnt) |
241 | goto unlock; | |
242 | ||
03c8efc1 HX |
243 | type = ask->type; |
244 | ||
c840ac6a | 245 | err = -ENOPROTOOPT; |
03c8efc1 HX |
246 | if (level != SOL_ALG || !type) |
247 | goto unlock; | |
248 | ||
249 | switch (optname) { | |
250 | case ALG_SET_KEY: | |
251 | if (sock->state == SS_CONNECTED) | |
252 | goto unlock; | |
253 | if (!type->setkey) | |
254 | goto unlock; | |
255 | ||
256 | err = alg_setkey(sk, optval, optlen); | |
25fb8638 SM |
257 | break; |
258 | case ALG_SET_AEAD_AUTHSIZE: | |
259 | if (sock->state == SS_CONNECTED) | |
260 | goto unlock; | |
261 | if (!type->setauthsize) | |
262 | goto unlock; | |
263 | err = type->setauthsize(ask->private, optlen); | |
03c8efc1 HX |
264 | } |
265 | ||
266 | unlock: | |
267 | release_sock(sk); | |
268 | ||
269 | return err; | |
270 | } | |
271 | ||
272 | int af_alg_accept(struct sock *sk, struct socket *newsock) | |
273 | { | |
274 | struct alg_sock *ask = alg_sk(sk); | |
275 | const struct af_alg_type *type; | |
276 | struct sock *sk2; | |
6a935170 | 277 | unsigned int nokey; |
03c8efc1 HX |
278 | int err; |
279 | ||
280 | lock_sock(sk); | |
281 | type = ask->type; | |
282 | ||
283 | err = -EINVAL; | |
284 | if (!type) | |
285 | goto unlock; | |
286 | ||
11aa9c28 | 287 | sk2 = sk_alloc(sock_net(sk), PF_ALG, GFP_KERNEL, &alg_proto, 0); |
03c8efc1 HX |
288 | err = -ENOMEM; |
289 | if (!sk2) | |
290 | goto unlock; | |
291 | ||
292 | sock_init_data(newsock, sk2); | |
507cad35 | 293 | sock_graft(sk2, newsock); |
4c63f83c | 294 | security_sk_clone(sk, sk2); |
03c8efc1 HX |
295 | |
296 | err = type->accept(ask->private, sk2); | |
37766586 HX |
297 | |
298 | nokey = err == -ENOKEY; | |
299 | if (nokey && type->accept_nokey) | |
300 | err = type->accept_nokey(ask->private, sk2); | |
301 | ||
a383292c | 302 | if (err) |
03c8efc1 | 303 | goto unlock; |
03c8efc1 HX |
304 | |
305 | sk2->sk_family = PF_ALG; | |
306 | ||
37766586 | 307 | if (nokey || !ask->refcnt++) |
c840ac6a | 308 | sock_hold(sk); |
03c8efc1 HX |
309 | alg_sk(sk2)->parent = sk; |
310 | alg_sk(sk2)->type = type; | |
6a935170 | 311 | alg_sk(sk2)->nokey_refcnt = nokey; |
03c8efc1 HX |
312 | |
313 | newsock->ops = type->ops; | |
314 | newsock->state = SS_CONNECTED; | |
315 | ||
37766586 HX |
316 | if (nokey) |
317 | newsock->ops = type->ops_nokey; | |
318 | ||
03c8efc1 HX |
319 | err = 0; |
320 | ||
321 | unlock: | |
322 | release_sock(sk); | |
323 | ||
324 | return err; | |
325 | } | |
326 | EXPORT_SYMBOL_GPL(af_alg_accept); | |
327 | ||
328 | static int alg_accept(struct socket *sock, struct socket *newsock, int flags) | |
329 | { | |
330 | return af_alg_accept(sock->sk, newsock); | |
331 | } | |
332 | ||
333 | static const struct proto_ops alg_proto_ops = { | |
334 | .family = PF_ALG, | |
335 | .owner = THIS_MODULE, | |
336 | ||
337 | .connect = sock_no_connect, | |
338 | .socketpair = sock_no_socketpair, | |
339 | .getname = sock_no_getname, | |
340 | .ioctl = sock_no_ioctl, | |
341 | .listen = sock_no_listen, | |
342 | .shutdown = sock_no_shutdown, | |
343 | .getsockopt = sock_no_getsockopt, | |
344 | .mmap = sock_no_mmap, | |
345 | .sendpage = sock_no_sendpage, | |
346 | .sendmsg = sock_no_sendmsg, | |
347 | .recvmsg = sock_no_recvmsg, | |
348 | .poll = sock_no_poll, | |
349 | ||
350 | .bind = alg_bind, | |
351 | .release = af_alg_release, | |
352 | .setsockopt = alg_setsockopt, | |
353 | .accept = alg_accept, | |
354 | }; | |
355 | ||
356 | static void alg_sock_destruct(struct sock *sk) | |
357 | { | |
358 | struct alg_sock *ask = alg_sk(sk); | |
359 | ||
360 | alg_do_release(ask->type, ask->private); | |
361 | } | |
362 | ||
363 | static int alg_create(struct net *net, struct socket *sock, int protocol, | |
364 | int kern) | |
365 | { | |
366 | struct sock *sk; | |
367 | int err; | |
368 | ||
369 | if (sock->type != SOCK_SEQPACKET) | |
370 | return -ESOCKTNOSUPPORT; | |
371 | if (protocol != 0) | |
372 | return -EPROTONOSUPPORT; | |
373 | ||
374 | err = -ENOMEM; | |
11aa9c28 | 375 | sk = sk_alloc(net, PF_ALG, GFP_KERNEL, &alg_proto, kern); |
03c8efc1 HX |
376 | if (!sk) |
377 | goto out; | |
378 | ||
379 | sock->ops = &alg_proto_ops; | |
380 | sock_init_data(sock, sk); | |
381 | ||
382 | sk->sk_family = PF_ALG; | |
383 | sk->sk_destruct = alg_sock_destruct; | |
384 | ||
385 | return 0; | |
386 | out: | |
387 | return err; | |
388 | } | |
389 | ||
390 | static const struct net_proto_family alg_family = { | |
391 | .family = PF_ALG, | |
392 | .create = alg_create, | |
393 | .owner = THIS_MODULE, | |
394 | }; | |
395 | ||
1d10eb2f | 396 | int af_alg_make_sg(struct af_alg_sgl *sgl, struct iov_iter *iter, int len) |
03c8efc1 | 397 | { |
1d10eb2f AV |
398 | size_t off; |
399 | ssize_t n; | |
400 | int npages, i; | |
03c8efc1 | 401 | |
1d10eb2f AV |
402 | n = iov_iter_get_pages(iter, sgl->pages, len, ALG_MAX_PAGES, &off); |
403 | if (n < 0) | |
404 | return n; | |
03c8efc1 | 405 | |
9399f0c5 | 406 | npages = (off + n + PAGE_SIZE - 1) >> PAGE_SHIFT; |
03c8efc1 | 407 | if (WARN_ON(npages == 0)) |
1d10eb2f | 408 | return -EINVAL; |
66db3739 TS |
409 | /* Add one extra for linking */ |
410 | sg_init_table(sgl->sg, npages + 1); | |
03c8efc1 | 411 | |
1d10eb2f | 412 | for (i = 0, len = n; i < npages; i++) { |
03c8efc1 HX |
413 | int plen = min_t(int, len, PAGE_SIZE - off); |
414 | ||
415 | sg_set_page(sgl->sg + i, sgl->pages[i], plen, off); | |
416 | ||
417 | off = 0; | |
418 | len -= plen; | |
03c8efc1 | 419 | } |
66db3739 TS |
420 | sg_mark_end(sgl->sg + npages - 1); |
421 | sgl->npages = npages; | |
422 | ||
1d10eb2f | 423 | return n; |
03c8efc1 HX |
424 | } |
425 | EXPORT_SYMBOL_GPL(af_alg_make_sg); | |
426 | ||
66db3739 TS |
427 | void af_alg_link_sg(struct af_alg_sgl *sgl_prev, struct af_alg_sgl *sgl_new) |
428 | { | |
429 | sg_unmark_end(sgl_prev->sg + sgl_prev->npages - 1); | |
430 | sg_chain(sgl_prev->sg, sgl_prev->npages + 1, sgl_new->sg); | |
431 | } | |
bd507520 | 432 | EXPORT_SYMBOL_GPL(af_alg_link_sg); |
66db3739 | 433 | |
03c8efc1 HX |
434 | void af_alg_free_sg(struct af_alg_sgl *sgl) |
435 | { | |
436 | int i; | |
437 | ||
66db3739 | 438 | for (i = 0; i < sgl->npages; i++) |
03c8efc1 | 439 | put_page(sgl->pages[i]); |
03c8efc1 HX |
440 | } |
441 | EXPORT_SYMBOL_GPL(af_alg_free_sg); | |
442 | ||
443 | int af_alg_cmsg_send(struct msghdr *msg, struct af_alg_control *con) | |
444 | { | |
445 | struct cmsghdr *cmsg; | |
446 | ||
f95b414e | 447 | for_each_cmsghdr(cmsg, msg) { |
03c8efc1 HX |
448 | if (!CMSG_OK(msg, cmsg)) |
449 | return -EINVAL; | |
450 | if (cmsg->cmsg_level != SOL_ALG) | |
451 | continue; | |
452 | ||
267c4221 | 453 | switch (cmsg->cmsg_type) { |
03c8efc1 HX |
454 | case ALG_SET_IV: |
455 | if (cmsg->cmsg_len < CMSG_LEN(sizeof(*con->iv))) | |
456 | return -EINVAL; | |
457 | con->iv = (void *)CMSG_DATA(cmsg); | |
458 | if (cmsg->cmsg_len < CMSG_LEN(con->iv->ivlen + | |
459 | sizeof(*con->iv))) | |
460 | return -EINVAL; | |
461 | break; | |
462 | ||
463 | case ALG_SET_OP: | |
464 | if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32))) | |
465 | return -EINVAL; | |
466 | con->op = *(u32 *)CMSG_DATA(cmsg); | |
467 | break; | |
468 | ||
af8e8073 SM |
469 | case ALG_SET_AEAD_ASSOCLEN: |
470 | if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32))) | |
471 | return -EINVAL; | |
472 | con->aead_assoclen = *(u32 *)CMSG_DATA(cmsg); | |
473 | break; | |
474 | ||
03c8efc1 HX |
475 | default: |
476 | return -EINVAL; | |
477 | } | |
478 | } | |
479 | ||
480 | return 0; | |
481 | } | |
482 | EXPORT_SYMBOL_GPL(af_alg_cmsg_send); | |
483 | ||
484 | int af_alg_wait_for_completion(int err, struct af_alg_completion *completion) | |
485 | { | |
486 | switch (err) { | |
487 | case -EINPROGRESS: | |
488 | case -EBUSY: | |
489 | wait_for_completion(&completion->completion); | |
16735d02 | 490 | reinit_completion(&completion->completion); |
03c8efc1 HX |
491 | err = completion->err; |
492 | break; | |
493 | }; | |
494 | ||
495 | return err; | |
496 | } | |
497 | EXPORT_SYMBOL_GPL(af_alg_wait_for_completion); | |
498 | ||
499 | void af_alg_complete(struct crypto_async_request *req, int err) | |
500 | { | |
501 | struct af_alg_completion *completion = req->data; | |
502 | ||
7e77bdeb RV |
503 | if (err == -EINPROGRESS) |
504 | return; | |
505 | ||
03c8efc1 HX |
506 | completion->err = err; |
507 | complete(&completion->completion); | |
508 | } | |
509 | EXPORT_SYMBOL_GPL(af_alg_complete); | |
510 | ||
511 | static int __init af_alg_init(void) | |
512 | { | |
513 | int err = proto_register(&alg_proto, 0); | |
514 | ||
515 | if (err) | |
516 | goto out; | |
517 | ||
518 | err = sock_register(&alg_family); | |
519 | if (err != 0) | |
520 | goto out_unregister_proto; | |
521 | ||
522 | out: | |
523 | return err; | |
524 | ||
525 | out_unregister_proto: | |
526 | proto_unregister(&alg_proto); | |
527 | goto out; | |
528 | } | |
529 | ||
530 | static void __exit af_alg_exit(void) | |
531 | { | |
532 | sock_unregister(PF_ALG); | |
533 | proto_unregister(&alg_proto); | |
534 | } | |
535 | ||
536 | module_init(af_alg_init); | |
537 | module_exit(af_alg_exit); | |
538 | MODULE_LICENSE("GPL"); | |
539 | MODULE_ALIAS_NETPROTO(AF_ALG); |