gro: Allow tunnel stacking in the case of FOU/GUE
[linux/fpc-iii.git] / crypto / af_alg.c
blob9641b74b53ef14375360e6ee5c4e7cdcd5e8b6f5
1 /*
2 * af_alg: User-space algorithm interface
4 * This file provides the user-space API for algorithms.
6 * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
8 * This program is free software; you can redistribute it and/or modify it
9 * under the terms of the GNU General Public License as published by the Free
10 * Software Foundation; either version 2 of the License, or (at your option)
11 * any later version.
15 #include <linux/atomic.h>
16 #include <crypto/if_alg.h>
17 #include <linux/crypto.h>
18 #include <linux/init.h>
19 #include <linux/kernel.h>
20 #include <linux/list.h>
21 #include <linux/module.h>
22 #include <linux/net.h>
23 #include <linux/rwsem.h>
24 #include <linux/security.h>
26 struct alg_type_list {
27 const struct af_alg_type *type;
28 struct list_head list;
31 static atomic_long_t alg_memory_allocated;
33 static struct proto alg_proto = {
34 .name = "ALG",
35 .owner = THIS_MODULE,
36 .memory_allocated = &alg_memory_allocated,
37 .obj_size = sizeof(struct alg_sock),
40 static LIST_HEAD(alg_types);
41 static DECLARE_RWSEM(alg_types_sem);
43 static const struct af_alg_type *alg_get_type(const char *name)
45 const struct af_alg_type *type = ERR_PTR(-ENOENT);
46 struct alg_type_list *node;
48 down_read(&alg_types_sem);
49 list_for_each_entry(node, &alg_types, list) {
50 if (strcmp(node->type->name, name))
51 continue;
53 if (try_module_get(node->type->owner))
54 type = node->type;
55 break;
57 up_read(&alg_types_sem);
59 return type;
62 int af_alg_register_type(const struct af_alg_type *type)
64 struct alg_type_list *node;
65 int err = -EEXIST;
67 down_write(&alg_types_sem);
68 list_for_each_entry(node, &alg_types, list) {
69 if (!strcmp(node->type->name, type->name))
70 goto unlock;
73 node = kmalloc(sizeof(*node), GFP_KERNEL);
74 err = -ENOMEM;
75 if (!node)
76 goto unlock;
78 type->ops->owner = THIS_MODULE;
79 if (type->ops_nokey)
80 type->ops_nokey->owner = THIS_MODULE;
81 node->type = type;
82 list_add(&node->list, &alg_types);
83 err = 0;
85 unlock:
86 up_write(&alg_types_sem);
88 return err;
90 EXPORT_SYMBOL_GPL(af_alg_register_type);
92 int af_alg_unregister_type(const struct af_alg_type *type)
94 struct alg_type_list *node;
95 int err = -ENOENT;
97 down_write(&alg_types_sem);
98 list_for_each_entry(node, &alg_types, list) {
99 if (strcmp(node->type->name, type->name))
100 continue;
102 list_del(&node->list);
103 kfree(node);
104 err = 0;
105 break;
107 up_write(&alg_types_sem);
109 return err;
111 EXPORT_SYMBOL_GPL(af_alg_unregister_type);
113 static void alg_do_release(const struct af_alg_type *type, void *private)
115 if (!type)
116 return;
118 type->release(private);
119 module_put(type->owner);
122 int af_alg_release(struct socket *sock)
124 if (sock->sk)
125 sock_put(sock->sk);
126 return 0;
128 EXPORT_SYMBOL_GPL(af_alg_release);
130 void af_alg_release_parent(struct sock *sk)
132 struct alg_sock *ask = alg_sk(sk);
133 unsigned int nokey = ask->nokey_refcnt;
134 bool last = nokey && !ask->refcnt;
136 sk = ask->parent;
137 ask = alg_sk(sk);
139 lock_sock(sk);
140 ask->nokey_refcnt -= nokey;
141 if (!last)
142 last = !--ask->refcnt;
143 release_sock(sk);
145 if (last)
146 sock_put(sk);
148 EXPORT_SYMBOL_GPL(af_alg_release_parent);
150 static int alg_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
152 struct sock *sk = sock->sk;
153 struct alg_sock *ask = alg_sk(sk);
154 struct sockaddr_alg *sa = (void *)uaddr;
155 const struct af_alg_type *type;
156 void *private;
157 int err;
159 if (sock->state == SS_CONNECTED)
160 return -EINVAL;
162 if (addr_len != sizeof(*sa))
163 return -EINVAL;
165 sa->salg_type[sizeof(sa->salg_type) - 1] = 0;
166 sa->salg_name[sizeof(sa->salg_name) - 1] = 0;
168 type = alg_get_type(sa->salg_type);
169 if (IS_ERR(type) && PTR_ERR(type) == -ENOENT) {
170 request_module("algif-%s", sa->salg_type);
171 type = alg_get_type(sa->salg_type);
174 if (IS_ERR(type))
175 return PTR_ERR(type);
177 private = type->bind(sa->salg_name, sa->salg_feat, sa->salg_mask);
178 if (IS_ERR(private)) {
179 module_put(type->owner);
180 return PTR_ERR(private);
183 err = -EBUSY;
184 lock_sock(sk);
185 if (ask->refcnt | ask->nokey_refcnt)
186 goto unlock;
188 swap(ask->type, type);
189 swap(ask->private, private);
191 err = 0;
193 unlock:
194 release_sock(sk);
196 alg_do_release(type, private);
198 return err;
201 static int alg_setkey(struct sock *sk, char __user *ukey,
202 unsigned int keylen)
204 struct alg_sock *ask = alg_sk(sk);
205 const struct af_alg_type *type = ask->type;
206 u8 *key;
207 int err;
209 key = sock_kmalloc(sk, keylen, GFP_KERNEL);
210 if (!key)
211 return -ENOMEM;
213 err = -EFAULT;
214 if (copy_from_user(key, ukey, keylen))
215 goto out;
217 err = type->setkey(ask->private, key, keylen);
219 out:
220 sock_kzfree_s(sk, key, keylen);
222 return err;
225 static int alg_setsockopt(struct socket *sock, int level, int optname,
226 char __user *optval, unsigned int optlen)
228 struct sock *sk = sock->sk;
229 struct alg_sock *ask = alg_sk(sk);
230 const struct af_alg_type *type;
231 int err = -EBUSY;
233 lock_sock(sk);
234 if (ask->refcnt)
235 goto unlock;
237 type = ask->type;
239 err = -ENOPROTOOPT;
240 if (level != SOL_ALG || !type)
241 goto unlock;
243 switch (optname) {
244 case ALG_SET_KEY:
245 if (sock->state == SS_CONNECTED)
246 goto unlock;
247 if (!type->setkey)
248 goto unlock;
250 err = alg_setkey(sk, optval, optlen);
251 break;
252 case ALG_SET_AEAD_AUTHSIZE:
253 if (sock->state == SS_CONNECTED)
254 goto unlock;
255 if (!type->setauthsize)
256 goto unlock;
257 err = type->setauthsize(ask->private, optlen);
260 unlock:
261 release_sock(sk);
263 return err;
266 int af_alg_accept(struct sock *sk, struct socket *newsock)
268 struct alg_sock *ask = alg_sk(sk);
269 const struct af_alg_type *type;
270 struct sock *sk2;
271 unsigned int nokey;
272 int err;
274 lock_sock(sk);
275 type = ask->type;
277 err = -EINVAL;
278 if (!type)
279 goto unlock;
281 sk2 = sk_alloc(sock_net(sk), PF_ALG, GFP_KERNEL, &alg_proto);
282 err = -ENOMEM;
283 if (!sk2)
284 goto unlock;
286 sock_init_data(newsock, sk2);
287 sock_graft(sk2, newsock);
288 security_sk_clone(sk, sk2);
290 err = type->accept(ask->private, sk2);
292 nokey = err == -ENOKEY;
293 if (nokey && type->accept_nokey)
294 err = type->accept_nokey(ask->private, sk2);
296 if (err)
297 goto unlock;
299 sk2->sk_family = PF_ALG;
301 if (nokey || !ask->refcnt++)
302 sock_hold(sk);
303 ask->nokey_refcnt += nokey;
304 alg_sk(sk2)->parent = sk;
305 alg_sk(sk2)->type = type;
306 alg_sk(sk2)->nokey_refcnt = nokey;
308 newsock->ops = type->ops;
309 newsock->state = SS_CONNECTED;
311 if (nokey)
312 newsock->ops = type->ops_nokey;
314 err = 0;
316 unlock:
317 release_sock(sk);
319 return err;
321 EXPORT_SYMBOL_GPL(af_alg_accept);
323 static int alg_accept(struct socket *sock, struct socket *newsock, int flags)
325 return af_alg_accept(sock->sk, newsock);
328 static const struct proto_ops alg_proto_ops = {
329 .family = PF_ALG,
330 .owner = THIS_MODULE,
332 .connect = sock_no_connect,
333 .socketpair = sock_no_socketpair,
334 .getname = sock_no_getname,
335 .ioctl = sock_no_ioctl,
336 .listen = sock_no_listen,
337 .shutdown = sock_no_shutdown,
338 .getsockopt = sock_no_getsockopt,
339 .mmap = sock_no_mmap,
340 .sendpage = sock_no_sendpage,
341 .sendmsg = sock_no_sendmsg,
342 .recvmsg = sock_no_recvmsg,
343 .poll = sock_no_poll,
345 .bind = alg_bind,
346 .release = af_alg_release,
347 .setsockopt = alg_setsockopt,
348 .accept = alg_accept,
351 static void alg_sock_destruct(struct sock *sk)
353 struct alg_sock *ask = alg_sk(sk);
355 alg_do_release(ask->type, ask->private);
358 static int alg_create(struct net *net, struct socket *sock, int protocol,
359 int kern)
361 struct sock *sk;
362 int err;
364 if (sock->type != SOCK_SEQPACKET)
365 return -ESOCKTNOSUPPORT;
366 if (protocol != 0)
367 return -EPROTONOSUPPORT;
369 err = -ENOMEM;
370 sk = sk_alloc(net, PF_ALG, GFP_KERNEL, &alg_proto);
371 if (!sk)
372 goto out;
374 sock->ops = &alg_proto_ops;
375 sock_init_data(sock, sk);
377 sk->sk_family = PF_ALG;
378 sk->sk_destruct = alg_sock_destruct;
380 return 0;
381 out:
382 return err;
385 static const struct net_proto_family alg_family = {
386 .family = PF_ALG,
387 .create = alg_create,
388 .owner = THIS_MODULE,
391 int af_alg_make_sg(struct af_alg_sgl *sgl, struct iov_iter *iter, int len)
393 size_t off;
394 ssize_t n;
395 int npages, i;
397 n = iov_iter_get_pages(iter, sgl->pages, len, ALG_MAX_PAGES, &off);
398 if (n < 0)
399 return n;
401 npages = (off + n + PAGE_SIZE - 1) >> PAGE_SHIFT;
402 if (WARN_ON(npages == 0))
403 return -EINVAL;
404 /* Add one extra for linking */
405 sg_init_table(sgl->sg, npages + 1);
407 for (i = 0, len = n; i < npages; i++) {
408 int plen = min_t(int, len, PAGE_SIZE - off);
410 sg_set_page(sgl->sg + i, sgl->pages[i], plen, off);
412 off = 0;
413 len -= plen;
415 sg_mark_end(sgl->sg + npages - 1);
416 sgl->npages = npages;
418 return n;
420 EXPORT_SYMBOL_GPL(af_alg_make_sg);
422 void af_alg_link_sg(struct af_alg_sgl *sgl_prev, struct af_alg_sgl *sgl_new)
424 sg_unmark_end(sgl_prev->sg + sgl_prev->npages - 1);
425 sg_chain(sgl_prev->sg, sgl_prev->npages + 1, sgl_new->sg);
427 EXPORT_SYMBOL_GPL(af_alg_link_sg);
429 void af_alg_free_sg(struct af_alg_sgl *sgl)
431 int i;
433 for (i = 0; i < sgl->npages; i++)
434 put_page(sgl->pages[i]);
436 EXPORT_SYMBOL_GPL(af_alg_free_sg);
438 int af_alg_cmsg_send(struct msghdr *msg, struct af_alg_control *con)
440 struct cmsghdr *cmsg;
442 for_each_cmsghdr(cmsg, msg) {
443 if (!CMSG_OK(msg, cmsg))
444 return -EINVAL;
445 if (cmsg->cmsg_level != SOL_ALG)
446 continue;
448 switch (cmsg->cmsg_type) {
449 case ALG_SET_IV:
450 if (cmsg->cmsg_len < CMSG_LEN(sizeof(*con->iv)))
451 return -EINVAL;
452 con->iv = (void *)CMSG_DATA(cmsg);
453 if (cmsg->cmsg_len < CMSG_LEN(con->iv->ivlen +
454 sizeof(*con->iv)))
455 return -EINVAL;
456 break;
458 case ALG_SET_OP:
459 if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32)))
460 return -EINVAL;
461 con->op = *(u32 *)CMSG_DATA(cmsg);
462 break;
464 case ALG_SET_AEAD_ASSOCLEN:
465 if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32)))
466 return -EINVAL;
467 con->aead_assoclen = *(u32 *)CMSG_DATA(cmsg);
468 break;
470 default:
471 return -EINVAL;
475 return 0;
477 EXPORT_SYMBOL_GPL(af_alg_cmsg_send);
479 int af_alg_wait_for_completion(int err, struct af_alg_completion *completion)
481 switch (err) {
482 case -EINPROGRESS:
483 case -EBUSY:
484 wait_for_completion(&completion->completion);
485 reinit_completion(&completion->completion);
486 err = completion->err;
487 break;
490 return err;
492 EXPORT_SYMBOL_GPL(af_alg_wait_for_completion);
494 void af_alg_complete(struct crypto_async_request *req, int err)
496 struct af_alg_completion *completion = req->data;
498 if (err == -EINPROGRESS)
499 return;
501 completion->err = err;
502 complete(&completion->completion);
504 EXPORT_SYMBOL_GPL(af_alg_complete);
506 static int __init af_alg_init(void)
508 int err = proto_register(&alg_proto, 0);
510 if (err)
511 goto out;
513 err = sock_register(&alg_family);
514 if (err != 0)
515 goto out_unregister_proto;
517 out:
518 return err;
520 out_unregister_proto:
521 proto_unregister(&alg_proto);
522 goto out;
525 static void __exit af_alg_exit(void)
527 sock_unregister(PF_ALG);
528 proto_unregister(&alg_proto);
531 module_init(af_alg_init);
532 module_exit(af_alg_exit);
533 MODULE_LICENSE("GPL");
534 MODULE_ALIAS_NETPROTO(AF_ALG);