af_alg.c 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494
  1. /*
  2. * af_alg: User-space algorithm interface
  3. *
  4. * This file provides the user-space API for algorithms.
  5. *
  6. * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
  7. *
  8. * This program is free software; you can redistribute it and/or modify it
  9. * under the terms of the GNU General Public License as published by the Free
  10. * Software Foundation; either version 2 of the License, or (at your option)
  11. * any later version.
  12. *
  13. */
  14. #include <linux/atomic.h>
  15. #include <crypto/if_alg.h>
  16. #include <linux/crypto.h>
  17. #include <linux/init.h>
  18. #include <linux/kernel.h>
  19. #include <linux/list.h>
  20. #include <linux/module.h>
  21. #include <linux/net.h>
  22. #include <linux/rwsem.h>
  23. #include <linux/security.h>
  24. struct alg_type_list {
  25. const struct af_alg_type *type;
  26. struct list_head list;
  27. };
  28. static atomic_long_t alg_memory_allocated;
  29. static struct proto alg_proto = {
  30. .name = "ALG",
  31. .owner = THIS_MODULE,
  32. .memory_allocated = &alg_memory_allocated,
  33. .obj_size = sizeof(struct alg_sock),
  34. };
  35. static LIST_HEAD(alg_types);
  36. static DECLARE_RWSEM(alg_types_sem);
  37. static const struct af_alg_type *alg_get_type(const char *name)
  38. {
  39. const struct af_alg_type *type = ERR_PTR(-ENOENT);
  40. struct alg_type_list *node;
  41. down_read(&alg_types_sem);
  42. list_for_each_entry(node, &alg_types, list) {
  43. if (strcmp(node->type->name, name))
  44. continue;
  45. if (try_module_get(node->type->owner))
  46. type = node->type;
  47. break;
  48. }
  49. up_read(&alg_types_sem);
  50. return type;
  51. }
  52. int af_alg_register_type(const struct af_alg_type *type)
  53. {
  54. struct alg_type_list *node;
  55. int err = -EEXIST;
  56. down_write(&alg_types_sem);
  57. list_for_each_entry(node, &alg_types, list) {
  58. if (!strcmp(node->type->name, type->name))
  59. goto unlock;
  60. }
  61. node = kmalloc(sizeof(*node), GFP_KERNEL);
  62. err = -ENOMEM;
  63. if (!node)
  64. goto unlock;
  65. type->ops->owner = THIS_MODULE;
  66. node->type = type;
  67. list_add(&node->list, &alg_types);
  68. err = 0;
  69. unlock:
  70. up_write(&alg_types_sem);
  71. return err;
  72. }
  73. EXPORT_SYMBOL_GPL(af_alg_register_type);
  74. int af_alg_unregister_type(const struct af_alg_type *type)
  75. {
  76. struct alg_type_list *node;
  77. int err = -ENOENT;
  78. down_write(&alg_types_sem);
  79. list_for_each_entry(node, &alg_types, list) {
  80. if (strcmp(node->type->name, type->name))
  81. continue;
  82. list_del(&node->list);
  83. kfree(node);
  84. err = 0;
  85. break;
  86. }
  87. up_write(&alg_types_sem);
  88. return err;
  89. }
  90. EXPORT_SYMBOL_GPL(af_alg_unregister_type);
  91. static void alg_do_release(const struct af_alg_type *type, void *private)
  92. {
  93. if (!type)
  94. return;
  95. type->release(private);
  96. module_put(type->owner);
  97. }
  98. int af_alg_release(struct socket *sock)
  99. {
  100. if (sock->sk)
  101. sock_put(sock->sk);
  102. return 0;
  103. }
  104. EXPORT_SYMBOL_GPL(af_alg_release);
  105. static int alg_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
  106. {
  107. const u32 forbidden = CRYPTO_ALG_INTERNAL;
  108. struct sock *sk = sock->sk;
  109. struct alg_sock *ask = alg_sk(sk);
  110. struct sockaddr_alg *sa = (void *)uaddr;
  111. const struct af_alg_type *type;
  112. void *private;
  113. if (sock->state == SS_CONNECTED)
  114. return -EINVAL;
  115. if (addr_len != sizeof(*sa))
  116. return -EINVAL;
  117. sa->salg_type[sizeof(sa->salg_type) - 1] = 0;
  118. sa->salg_name[sizeof(sa->salg_name) - 1] = 0;
  119. type = alg_get_type(sa->salg_type);
  120. if (IS_ERR(type) && PTR_ERR(type) == -ENOENT) {
  121. request_module("algif-%s", sa->salg_type);
  122. type = alg_get_type(sa->salg_type);
  123. }
  124. if (IS_ERR(type))
  125. return PTR_ERR(type);
  126. private = type->bind(sa->salg_name,
  127. sa->salg_feat & ~forbidden,
  128. sa->salg_mask & ~forbidden);
  129. if (IS_ERR(private)) {
  130. module_put(type->owner);
  131. return PTR_ERR(private);
  132. }
  133. lock_sock(sk);
  134. swap(ask->type, type);
  135. swap(ask->private, private);
  136. release_sock(sk);
  137. alg_do_release(type, private);
  138. return 0;
  139. }
  140. static int alg_setkey(struct sock *sk, char __user *ukey,
  141. unsigned int keylen)
  142. {
  143. struct alg_sock *ask = alg_sk(sk);
  144. const struct af_alg_type *type = ask->type;
  145. u8 *key;
  146. int err;
  147. key = sock_kmalloc(sk, keylen, GFP_KERNEL);
  148. if (!key)
  149. return -ENOMEM;
  150. err = -EFAULT;
  151. if (copy_from_user(key, ukey, keylen))
  152. goto out;
  153. err = type->setkey(ask->private, key, keylen);
  154. out:
  155. sock_kzfree_s(sk, key, keylen);
  156. return err;
  157. }
  158. static int alg_setsockopt(struct socket *sock, int level, int optname,
  159. char __user *optval, unsigned int optlen)
  160. {
  161. struct sock *sk = sock->sk;
  162. struct alg_sock *ask = alg_sk(sk);
  163. const struct af_alg_type *type;
  164. int err = -ENOPROTOOPT;
  165. lock_sock(sk);
  166. type = ask->type;
  167. if (level != SOL_ALG || !type)
  168. goto unlock;
  169. switch (optname) {
  170. case ALG_SET_KEY:
  171. if (sock->state == SS_CONNECTED)
  172. goto unlock;
  173. if (!type->setkey)
  174. goto unlock;
  175. err = alg_setkey(sk, optval, optlen);
  176. break;
  177. case ALG_SET_AEAD_AUTHSIZE:
  178. if (sock->state == SS_CONNECTED)
  179. goto unlock;
  180. if (!type->setauthsize)
  181. goto unlock;
  182. err = type->setauthsize(ask->private, optlen);
  183. }
  184. unlock:
  185. release_sock(sk);
  186. return err;
  187. }
  188. int af_alg_accept(struct sock *sk, struct socket *newsock)
  189. {
  190. struct alg_sock *ask = alg_sk(sk);
  191. const struct af_alg_type *type;
  192. struct sock *sk2;
  193. int err;
  194. lock_sock(sk);
  195. type = ask->type;
  196. err = -EINVAL;
  197. if (!type)
  198. goto unlock;
  199. sk2 = sk_alloc(sock_net(sk), PF_ALG, GFP_KERNEL, &alg_proto, 0);
  200. err = -ENOMEM;
  201. if (!sk2)
  202. goto unlock;
  203. sock_init_data(newsock, sk2);
  204. sock_graft(sk2, newsock);
  205. security_sk_clone(sk, sk2);
  206. err = type->accept(ask->private, sk2);
  207. if (err) {
  208. sk_free(sk2);
  209. goto unlock;
  210. }
  211. sk2->sk_family = PF_ALG;
  212. sock_hold(sk);
  213. alg_sk(sk2)->parent = sk;
  214. alg_sk(sk2)->type = type;
  215. newsock->ops = type->ops;
  216. newsock->state = SS_CONNECTED;
  217. err = 0;
  218. unlock:
  219. release_sock(sk);
  220. return err;
  221. }
  222. EXPORT_SYMBOL_GPL(af_alg_accept);
  223. static int alg_accept(struct socket *sock, struct socket *newsock, int flags)
  224. {
  225. return af_alg_accept(sock->sk, newsock);
  226. }
  227. static const struct proto_ops alg_proto_ops = {
  228. .family = PF_ALG,
  229. .owner = THIS_MODULE,
  230. .connect = sock_no_connect,
  231. .socketpair = sock_no_socketpair,
  232. .getname = sock_no_getname,
  233. .ioctl = sock_no_ioctl,
  234. .listen = sock_no_listen,
  235. .shutdown = sock_no_shutdown,
  236. .getsockopt = sock_no_getsockopt,
  237. .mmap = sock_no_mmap,
  238. .sendpage = sock_no_sendpage,
  239. .sendmsg = sock_no_sendmsg,
  240. .recvmsg = sock_no_recvmsg,
  241. .poll = sock_no_poll,
  242. .bind = alg_bind,
  243. .release = af_alg_release,
  244. .setsockopt = alg_setsockopt,
  245. .accept = alg_accept,
  246. };
  247. static void alg_sock_destruct(struct sock *sk)
  248. {
  249. struct alg_sock *ask = alg_sk(sk);
  250. alg_do_release(ask->type, ask->private);
  251. }
  252. static int alg_create(struct net *net, struct socket *sock, int protocol,
  253. int kern)
  254. {
  255. struct sock *sk;
  256. int err;
  257. if (sock->type != SOCK_SEQPACKET)
  258. return -ESOCKTNOSUPPORT;
  259. if (protocol != 0)
  260. return -EPROTONOSUPPORT;
  261. err = -ENOMEM;
  262. sk = sk_alloc(net, PF_ALG, GFP_KERNEL, &alg_proto, kern);
  263. if (!sk)
  264. goto out;
  265. sock->ops = &alg_proto_ops;
  266. sock_init_data(sock, sk);
  267. sk->sk_family = PF_ALG;
  268. sk->sk_destruct = alg_sock_destruct;
  269. return 0;
  270. out:
  271. return err;
  272. }
  273. static const struct net_proto_family alg_family = {
  274. .family = PF_ALG,
  275. .create = alg_create,
  276. .owner = THIS_MODULE,
  277. };
  278. int af_alg_make_sg(struct af_alg_sgl *sgl, struct iov_iter *iter, int len)
  279. {
  280. size_t off;
  281. ssize_t n;
  282. int npages, i;
  283. n = iov_iter_get_pages(iter, sgl->pages, len, ALG_MAX_PAGES, &off);
  284. if (n < 0)
  285. return n;
  286. npages = (off + n + PAGE_SIZE - 1) >> PAGE_SHIFT;
  287. if (WARN_ON(npages == 0))
  288. return -EINVAL;
  289. /* Add one extra for linking */
  290. sg_init_table(sgl->sg, npages + 1);
  291. for (i = 0, len = n; i < npages; i++) {
  292. int plen = min_t(int, len, PAGE_SIZE - off);
  293. sg_set_page(sgl->sg + i, sgl->pages[i], plen, off);
  294. off = 0;
  295. len -= plen;
  296. }
  297. sg_mark_end(sgl->sg + npages - 1);
  298. sgl->npages = npages;
  299. return n;
  300. }
  301. EXPORT_SYMBOL_GPL(af_alg_make_sg);
  302. void af_alg_link_sg(struct af_alg_sgl *sgl_prev, struct af_alg_sgl *sgl_new)
  303. {
  304. sg_unmark_end(sgl_prev->sg + sgl_prev->npages - 1);
  305. sg_chain(sgl_prev->sg, sgl_prev->npages + 1, sgl_new->sg);
  306. }
  307. EXPORT_SYMBOL_GPL(af_alg_link_sg);
  308. void af_alg_free_sg(struct af_alg_sgl *sgl)
  309. {
  310. int i;
  311. for (i = 0; i < sgl->npages; i++)
  312. put_page(sgl->pages[i]);
  313. }
  314. EXPORT_SYMBOL_GPL(af_alg_free_sg);
  315. int af_alg_cmsg_send(struct msghdr *msg, struct af_alg_control *con)
  316. {
  317. struct cmsghdr *cmsg;
  318. for_each_cmsghdr(cmsg, msg) {
  319. if (!CMSG_OK(msg, cmsg))
  320. return -EINVAL;
  321. if (cmsg->cmsg_level != SOL_ALG)
  322. continue;
  323. switch (cmsg->cmsg_type) {
  324. case ALG_SET_IV:
  325. if (cmsg->cmsg_len < CMSG_LEN(sizeof(*con->iv)))
  326. return -EINVAL;
  327. con->iv = (void *)CMSG_DATA(cmsg);
  328. if (cmsg->cmsg_len < CMSG_LEN(con->iv->ivlen +
  329. sizeof(*con->iv)))
  330. return -EINVAL;
  331. break;
  332. case ALG_SET_OP:
  333. if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32)))
  334. return -EINVAL;
  335. con->op = *(u32 *)CMSG_DATA(cmsg);
  336. break;
  337. case ALG_SET_AEAD_ASSOCLEN:
  338. if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32)))
  339. return -EINVAL;
  340. con->aead_assoclen = *(u32 *)CMSG_DATA(cmsg);
  341. break;
  342. default:
  343. return -EINVAL;
  344. }
  345. }
  346. return 0;
  347. }
  348. EXPORT_SYMBOL_GPL(af_alg_cmsg_send);
  349. int af_alg_wait_for_completion(int err, struct af_alg_completion *completion)
  350. {
  351. switch (err) {
  352. case -EINPROGRESS:
  353. case -EBUSY:
  354. wait_for_completion(&completion->completion);
  355. reinit_completion(&completion->completion);
  356. err = completion->err;
  357. break;
  358. };
  359. return err;
  360. }
  361. EXPORT_SYMBOL_GPL(af_alg_wait_for_completion);
  362. void af_alg_complete(struct crypto_async_request *req, int err)
  363. {
  364. struct af_alg_completion *completion = req->data;
  365. if (err == -EINPROGRESS)
  366. return;
  367. completion->err = err;
  368. complete(&completion->completion);
  369. }
  370. EXPORT_SYMBOL_GPL(af_alg_complete);
  371. static int __init af_alg_init(void)
  372. {
  373. int err = proto_register(&alg_proto, 0);
  374. if (err)
  375. goto out;
  376. err = sock_register(&alg_family);
  377. if (err != 0)
  378. goto out_unregister_proto;
  379. out:
  380. return err;
  381. out_unregister_proto:
  382. proto_unregister(&alg_proto);
  383. goto out;
  384. }
  385. static void __exit af_alg_exit(void)
  386. {
  387. sock_unregister(PF_ALG);
  388. proto_unregister(&alg_proto);
  389. }
  390. module_init(af_alg_init);
  391. module_exit(af_alg_exit);
  392. MODULE_LICENSE("GPL");
  393. MODULE_ALIAS_NETPROTO(AF_ALG);