af_alg.c 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523
  1. /*
  2. * af_alg: User-space algorithm interface
  3. *
  4. * This file provides the user-space API for algorithms.
  5. *
  6. * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
  7. *
  8. * This program is free software; you can redistribute it and/or modify it
  9. * under the terms of the GNU General Public License as published by the Free
  10. * Software Foundation; either version 2 of the License, or (at your option)
  11. * any later version.
  12. *
  13. */
  14. #include <linux/atomic.h>
  15. #include <crypto/if_alg.h>
  16. #include <linux/crypto.h>
  17. #include <linux/init.h>
  18. #include <linux/kernel.h>
  19. #include <linux/list.h>
  20. #include <linux/module.h>
  21. #include <linux/net.h>
  22. #include <linux/rwsem.h>
  23. #include <linux/security.h>
  24. struct alg_type_list {
  25. const struct af_alg_type *type;
  26. struct list_head list;
  27. };
  28. static atomic_long_t alg_memory_allocated;
  29. static struct proto alg_proto = {
  30. .name = "ALG",
  31. .owner = THIS_MODULE,
  32. .memory_allocated = &alg_memory_allocated,
  33. .obj_size = sizeof(struct alg_sock),
  34. };
  35. static LIST_HEAD(alg_types);
  36. static DECLARE_RWSEM(alg_types_sem);
  37. static const struct af_alg_type *alg_get_type(const char *name)
  38. {
  39. const struct af_alg_type *type = ERR_PTR(-ENOENT);
  40. struct alg_type_list *node;
  41. down_read(&alg_types_sem);
  42. list_for_each_entry(node, &alg_types, list) {
  43. if (strcmp(node->type->name, name))
  44. continue;
  45. if (try_module_get(node->type->owner))
  46. type = node->type;
  47. break;
  48. }
  49. up_read(&alg_types_sem);
  50. return type;
  51. }
  52. int af_alg_register_type(const struct af_alg_type *type)
  53. {
  54. struct alg_type_list *node;
  55. int err = -EEXIST;
  56. down_write(&alg_types_sem);
  57. list_for_each_entry(node, &alg_types, list) {
  58. if (!strcmp(node->type->name, type->name))
  59. goto unlock;
  60. }
  61. node = kmalloc(sizeof(*node), GFP_KERNEL);
  62. err = -ENOMEM;
  63. if (!node)
  64. goto unlock;
  65. type->ops->owner = THIS_MODULE;
  66. node->type = type;
  67. list_add(&node->list, &alg_types);
  68. err = 0;
  69. unlock:
  70. up_write(&alg_types_sem);
  71. return err;
  72. }
  73. EXPORT_SYMBOL_GPL(af_alg_register_type);
  74. int af_alg_unregister_type(const struct af_alg_type *type)
  75. {
  76. struct alg_type_list *node;
  77. int err = -ENOENT;
  78. down_write(&alg_types_sem);
  79. list_for_each_entry(node, &alg_types, list) {
  80. if (strcmp(node->type->name, type->name))
  81. continue;
  82. list_del(&node->list);
  83. kfree(node);
  84. err = 0;
  85. break;
  86. }
  87. up_write(&alg_types_sem);
  88. return err;
  89. }
  90. EXPORT_SYMBOL_GPL(af_alg_unregister_type);
  91. static void alg_do_release(const struct af_alg_type *type, void *private)
  92. {
  93. if (!type)
  94. return;
  95. type->release(private);
  96. module_put(type->owner);
  97. }
  98. int af_alg_release(struct socket *sock)
  99. {
  100. if (sock->sk)
  101. sock_put(sock->sk);
  102. return 0;
  103. }
  104. EXPORT_SYMBOL_GPL(af_alg_release);
  105. void af_alg_release_parent(struct sock *sk)
  106. {
  107. struct alg_sock *ask = alg_sk(sk);
  108. bool last;
  109. sk = ask->parent;
  110. ask = alg_sk(sk);
  111. lock_sock(sk);
  112. last = !--ask->refcnt;
  113. release_sock(sk);
  114. if (last)
  115. sock_put(sk);
  116. }
  117. EXPORT_SYMBOL_GPL(af_alg_release_parent);
  118. static int alg_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
  119. {
  120. const u32 forbidden = CRYPTO_ALG_INTERNAL;
  121. struct sock *sk = sock->sk;
  122. struct alg_sock *ask = alg_sk(sk);
  123. struct sockaddr_alg *sa = (void *)uaddr;
  124. const struct af_alg_type *type;
  125. void *private;
  126. int err;
  127. if (sock->state == SS_CONNECTED)
  128. return -EINVAL;
  129. if (addr_len != sizeof(*sa))
  130. return -EINVAL;
  131. sa->salg_type[sizeof(sa->salg_type) - 1] = 0;
  132. sa->salg_name[sizeof(sa->salg_name) - 1] = 0;
  133. type = alg_get_type(sa->salg_type);
  134. if (IS_ERR(type) && PTR_ERR(type) == -ENOENT) {
  135. request_module("algif-%s", sa->salg_type);
  136. type = alg_get_type(sa->salg_type);
  137. }
  138. if (IS_ERR(type))
  139. return PTR_ERR(type);
  140. private = type->bind(sa->salg_name,
  141. sa->salg_feat & ~forbidden,
  142. sa->salg_mask & ~forbidden);
  143. if (IS_ERR(private)) {
  144. module_put(type->owner);
  145. return PTR_ERR(private);
  146. }
  147. err = -EBUSY;
  148. lock_sock(sk);
  149. if (ask->refcnt)
  150. goto unlock;
  151. swap(ask->type, type);
  152. swap(ask->private, private);
  153. err = 0;
  154. unlock:
  155. release_sock(sk);
  156. alg_do_release(type, private);
  157. return err;
  158. }
  159. static int alg_setkey(struct sock *sk, char __user *ukey,
  160. unsigned int keylen)
  161. {
  162. struct alg_sock *ask = alg_sk(sk);
  163. const struct af_alg_type *type = ask->type;
  164. u8 *key;
  165. int err;
  166. key = sock_kmalloc(sk, keylen, GFP_KERNEL);
  167. if (!key)
  168. return -ENOMEM;
  169. err = -EFAULT;
  170. if (copy_from_user(key, ukey, keylen))
  171. goto out;
  172. err = type->setkey(ask->private, key, keylen);
  173. out:
  174. sock_kzfree_s(sk, key, keylen);
  175. return err;
  176. }
  177. static int alg_setsockopt(struct socket *sock, int level, int optname,
  178. char __user *optval, unsigned int optlen)
  179. {
  180. struct sock *sk = sock->sk;
  181. struct alg_sock *ask = alg_sk(sk);
  182. const struct af_alg_type *type;
  183. int err = -EBUSY;
  184. lock_sock(sk);
  185. if (ask->refcnt)
  186. goto unlock;
  187. type = ask->type;
  188. err = -ENOPROTOOPT;
  189. if (level != SOL_ALG || !type)
  190. goto unlock;
  191. switch (optname) {
  192. case ALG_SET_KEY:
  193. if (sock->state == SS_CONNECTED)
  194. goto unlock;
  195. if (!type->setkey)
  196. goto unlock;
  197. err = alg_setkey(sk, optval, optlen);
  198. break;
  199. case ALG_SET_AEAD_AUTHSIZE:
  200. if (sock->state == SS_CONNECTED)
  201. goto unlock;
  202. if (!type->setauthsize)
  203. goto unlock;
  204. err = type->setauthsize(ask->private, optlen);
  205. }
  206. unlock:
  207. release_sock(sk);
  208. return err;
  209. }
  210. int af_alg_accept(struct sock *sk, struct socket *newsock)
  211. {
  212. struct alg_sock *ask = alg_sk(sk);
  213. const struct af_alg_type *type;
  214. struct sock *sk2;
  215. int err;
  216. lock_sock(sk);
  217. type = ask->type;
  218. err = -EINVAL;
  219. if (!type)
  220. goto unlock;
  221. sk2 = sk_alloc(sock_net(sk), PF_ALG, GFP_KERNEL, &alg_proto, 0);
  222. err = -ENOMEM;
  223. if (!sk2)
  224. goto unlock;
  225. sock_init_data(newsock, sk2);
  226. sock_graft(sk2, newsock);
  227. security_sk_clone(sk, sk2);
  228. err = type->accept(ask->private, sk2);
  229. if (err) {
  230. sk_free(sk2);
  231. goto unlock;
  232. }
  233. sk2->sk_family = PF_ALG;
  234. if (!ask->refcnt++)
  235. sock_hold(sk);
  236. alg_sk(sk2)->parent = sk;
  237. alg_sk(sk2)->type = type;
  238. newsock->ops = type->ops;
  239. newsock->state = SS_CONNECTED;
  240. err = 0;
  241. unlock:
  242. release_sock(sk);
  243. return err;
  244. }
  245. EXPORT_SYMBOL_GPL(af_alg_accept);
  246. static int alg_accept(struct socket *sock, struct socket *newsock, int flags)
  247. {
  248. return af_alg_accept(sock->sk, newsock);
  249. }
  250. static const struct proto_ops alg_proto_ops = {
  251. .family = PF_ALG,
  252. .owner = THIS_MODULE,
  253. .connect = sock_no_connect,
  254. .socketpair = sock_no_socketpair,
  255. .getname = sock_no_getname,
  256. .ioctl = sock_no_ioctl,
  257. .listen = sock_no_listen,
  258. .shutdown = sock_no_shutdown,
  259. .getsockopt = sock_no_getsockopt,
  260. .mmap = sock_no_mmap,
  261. .sendpage = sock_no_sendpage,
  262. .sendmsg = sock_no_sendmsg,
  263. .recvmsg = sock_no_recvmsg,
  264. .poll = sock_no_poll,
  265. .bind = alg_bind,
  266. .release = af_alg_release,
  267. .setsockopt = alg_setsockopt,
  268. .accept = alg_accept,
  269. };
  270. static void alg_sock_destruct(struct sock *sk)
  271. {
  272. struct alg_sock *ask = alg_sk(sk);
  273. alg_do_release(ask->type, ask->private);
  274. }
  275. static int alg_create(struct net *net, struct socket *sock, int protocol,
  276. int kern)
  277. {
  278. struct sock *sk;
  279. int err;
  280. if (sock->type != SOCK_SEQPACKET)
  281. return -ESOCKTNOSUPPORT;
  282. if (protocol != 0)
  283. return -EPROTONOSUPPORT;
  284. err = -ENOMEM;
  285. sk = sk_alloc(net, PF_ALG, GFP_KERNEL, &alg_proto, kern);
  286. if (!sk)
  287. goto out;
  288. sock->ops = &alg_proto_ops;
  289. sock_init_data(sock, sk);
  290. sk->sk_family = PF_ALG;
  291. sk->sk_destruct = alg_sock_destruct;
  292. return 0;
  293. out:
  294. return err;
  295. }
  296. static const struct net_proto_family alg_family = {
  297. .family = PF_ALG,
  298. .create = alg_create,
  299. .owner = THIS_MODULE,
  300. };
  301. int af_alg_make_sg(struct af_alg_sgl *sgl, struct iov_iter *iter, int len)
  302. {
  303. size_t off;
  304. ssize_t n;
  305. int npages, i;
  306. n = iov_iter_get_pages(iter, sgl->pages, len, ALG_MAX_PAGES, &off);
  307. if (n < 0)
  308. return n;
  309. npages = (off + n + PAGE_SIZE - 1) >> PAGE_SHIFT;
  310. if (WARN_ON(npages == 0))
  311. return -EINVAL;
  312. /* Add one extra for linking */
  313. sg_init_table(sgl->sg, npages + 1);
  314. for (i = 0, len = n; i < npages; i++) {
  315. int plen = min_t(int, len, PAGE_SIZE - off);
  316. sg_set_page(sgl->sg + i, sgl->pages[i], plen, off);
  317. off = 0;
  318. len -= plen;
  319. }
  320. sg_mark_end(sgl->sg + npages - 1);
  321. sgl->npages = npages;
  322. return n;
  323. }
  324. EXPORT_SYMBOL_GPL(af_alg_make_sg);
  325. void af_alg_link_sg(struct af_alg_sgl *sgl_prev, struct af_alg_sgl *sgl_new)
  326. {
  327. sg_unmark_end(sgl_prev->sg + sgl_prev->npages - 1);
  328. sg_chain(sgl_prev->sg, sgl_prev->npages + 1, sgl_new->sg);
  329. }
  330. EXPORT_SYMBOL_GPL(af_alg_link_sg);
  331. void af_alg_free_sg(struct af_alg_sgl *sgl)
  332. {
  333. int i;
  334. for (i = 0; i < sgl->npages; i++)
  335. put_page(sgl->pages[i]);
  336. }
  337. EXPORT_SYMBOL_GPL(af_alg_free_sg);
  338. int af_alg_cmsg_send(struct msghdr *msg, struct af_alg_control *con)
  339. {
  340. struct cmsghdr *cmsg;
  341. for_each_cmsghdr(cmsg, msg) {
  342. if (!CMSG_OK(msg, cmsg))
  343. return -EINVAL;
  344. if (cmsg->cmsg_level != SOL_ALG)
  345. continue;
  346. switch (cmsg->cmsg_type) {
  347. case ALG_SET_IV:
  348. if (cmsg->cmsg_len < CMSG_LEN(sizeof(*con->iv)))
  349. return -EINVAL;
  350. con->iv = (void *)CMSG_DATA(cmsg);
  351. if (cmsg->cmsg_len < CMSG_LEN(con->iv->ivlen +
  352. sizeof(*con->iv)))
  353. return -EINVAL;
  354. break;
  355. case ALG_SET_OP:
  356. if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32)))
  357. return -EINVAL;
  358. con->op = *(u32 *)CMSG_DATA(cmsg);
  359. break;
  360. case ALG_SET_AEAD_ASSOCLEN:
  361. if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32)))
  362. return -EINVAL;
  363. con->aead_assoclen = *(u32 *)CMSG_DATA(cmsg);
  364. break;
  365. default:
  366. return -EINVAL;
  367. }
  368. }
  369. return 0;
  370. }
  371. EXPORT_SYMBOL_GPL(af_alg_cmsg_send);
  372. int af_alg_wait_for_completion(int err, struct af_alg_completion *completion)
  373. {
  374. switch (err) {
  375. case -EINPROGRESS:
  376. case -EBUSY:
  377. wait_for_completion(&completion->completion);
  378. reinit_completion(&completion->completion);
  379. err = completion->err;
  380. break;
  381. };
  382. return err;
  383. }
  384. EXPORT_SYMBOL_GPL(af_alg_wait_for_completion);
  385. void af_alg_complete(struct crypto_async_request *req, int err)
  386. {
  387. struct af_alg_completion *completion = req->data;
  388. if (err == -EINPROGRESS)
  389. return;
  390. completion->err = err;
  391. complete(&completion->completion);
  392. }
  393. EXPORT_SYMBOL_GPL(af_alg_complete);
  394. static int __init af_alg_init(void)
  395. {
  396. int err = proto_register(&alg_proto, 0);
  397. if (err)
  398. goto out;
  399. err = sock_register(&alg_family);
  400. if (err != 0)
  401. goto out_unregister_proto;
  402. out:
  403. return err;
  404. out_unregister_proto:
  405. proto_unregister(&alg_proto);
  406. goto out;
  407. }
  408. static void __exit af_alg_exit(void)
  409. {
  410. sock_unregister(PF_ALG);
  411. proto_unregister(&alg_proto);
  412. }
  413. module_init(af_alg_init);
  414. module_exit(af_alg_exit);
  415. MODULE_LICENSE("GPL");
  416. MODULE_ALIAS_NETPROTO(AF_ALG);