af_alg.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537
  1. /*
  2. * af_alg: User-space algorithm interface
  3. *
  4. * This file provides the user-space API for algorithms.
  5. *
  6. * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
  7. *
  8. * This program is free software; you can redistribute it and/or modify it
  9. * under the terms of the GNU General Public License as published by the Free
  10. * Software Foundation; either version 2 of the License, or (at your option)
  11. * any later version.
  12. *
  13. */
  14. #include <linux/atomic.h>
  15. #include <crypto/if_alg.h>
  16. #include <linux/crypto.h>
  17. #include <linux/init.h>
  18. #include <linux/kernel.h>
  19. #include <linux/list.h>
  20. #include <linux/module.h>
  21. #include <linux/net.h>
  22. #include <linux/rwsem.h>
  23. #include <linux/security.h>
  24. struct alg_type_list {
  25. const struct af_alg_type *type;
  26. struct list_head list;
  27. };
  28. static atomic_long_t alg_memory_allocated;
  29. static struct proto alg_proto = {
  30. .name = "ALG",
  31. .owner = THIS_MODULE,
  32. .memory_allocated = &alg_memory_allocated,
  33. .obj_size = sizeof(struct alg_sock),
  34. };
  35. static LIST_HEAD(alg_types);
  36. static DECLARE_RWSEM(alg_types_sem);
  37. static const struct af_alg_type *alg_get_type(const char *name)
  38. {
  39. const struct af_alg_type *type = ERR_PTR(-ENOENT);
  40. struct alg_type_list *node;
  41. down_read(&alg_types_sem);
  42. list_for_each_entry(node, &alg_types, list) {
  43. if (strcmp(node->type->name, name))
  44. continue;
  45. if (try_module_get(node->type->owner))
  46. type = node->type;
  47. break;
  48. }
  49. up_read(&alg_types_sem);
  50. return type;
  51. }
  52. int af_alg_register_type(const struct af_alg_type *type)
  53. {
  54. struct alg_type_list *node;
  55. int err = -EEXIST;
  56. down_write(&alg_types_sem);
  57. list_for_each_entry(node, &alg_types, list) {
  58. if (!strcmp(node->type->name, type->name))
  59. goto unlock;
  60. }
  61. node = kmalloc(sizeof(*node), GFP_KERNEL);
  62. err = -ENOMEM;
  63. if (!node)
  64. goto unlock;
  65. type->ops->owner = THIS_MODULE;
  66. if (type->ops_nokey)
  67. type->ops_nokey->owner = THIS_MODULE;
  68. node->type = type;
  69. list_add(&node->list, &alg_types);
  70. err = 0;
  71. unlock:
  72. up_write(&alg_types_sem);
  73. return err;
  74. }
  75. EXPORT_SYMBOL_GPL(af_alg_register_type);
  76. int af_alg_unregister_type(const struct af_alg_type *type)
  77. {
  78. struct alg_type_list *node;
  79. int err = -ENOENT;
  80. down_write(&alg_types_sem);
  81. list_for_each_entry(node, &alg_types, list) {
  82. if (strcmp(node->type->name, type->name))
  83. continue;
  84. list_del(&node->list);
  85. kfree(node);
  86. err = 0;
  87. break;
  88. }
  89. up_write(&alg_types_sem);
  90. return err;
  91. }
  92. EXPORT_SYMBOL_GPL(af_alg_unregister_type);
  93. static void alg_do_release(const struct af_alg_type *type, void *private)
  94. {
  95. if (!type)
  96. return;
  97. type->release(private);
  98. module_put(type->owner);
  99. }
  100. int af_alg_release(struct socket *sock)
  101. {
  102. if (sock->sk)
  103. sock_put(sock->sk);
  104. return 0;
  105. }
  106. EXPORT_SYMBOL_GPL(af_alg_release);
  107. void af_alg_release_parent(struct sock *sk)
  108. {
  109. struct alg_sock *ask = alg_sk(sk);
  110. unsigned int nokey = ask->nokey_refcnt;
  111. bool last = nokey && !ask->refcnt;
  112. sk = ask->parent;
  113. ask = alg_sk(sk);
  114. lock_sock(sk);
  115. ask->nokey_refcnt -= nokey;
  116. if (!last)
  117. last = !--ask->refcnt;
  118. release_sock(sk);
  119. if (last)
  120. sock_put(sk);
  121. }
  122. EXPORT_SYMBOL_GPL(af_alg_release_parent);
  123. static int alg_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
  124. {
  125. const u32 forbidden = CRYPTO_ALG_INTERNAL;
  126. struct sock *sk = sock->sk;
  127. struct alg_sock *ask = alg_sk(sk);
  128. struct sockaddr_alg *sa = (void *)uaddr;
  129. const struct af_alg_type *type;
  130. void *private;
  131. int err;
  132. if (sock->state == SS_CONNECTED)
  133. return -EINVAL;
  134. if (addr_len != sizeof(*sa))
  135. return -EINVAL;
  136. sa->salg_type[sizeof(sa->salg_type) - 1] = 0;
  137. sa->salg_name[sizeof(sa->salg_name) - 1] = 0;
  138. type = alg_get_type(sa->salg_type);
  139. if (IS_ERR(type) && PTR_ERR(type) == -ENOENT) {
  140. request_module("algif-%s", sa->salg_type);
  141. type = alg_get_type(sa->salg_type);
  142. }
  143. if (IS_ERR(type))
  144. return PTR_ERR(type);
  145. private = type->bind(sa->salg_name,
  146. sa->salg_feat & ~forbidden,
  147. sa->salg_mask & ~forbidden);
  148. if (IS_ERR(private)) {
  149. module_put(type->owner);
  150. return PTR_ERR(private);
  151. }
  152. err = -EBUSY;
  153. lock_sock(sk);
  154. if (ask->refcnt | ask->nokey_refcnt)
  155. goto unlock;
  156. swap(ask->type, type);
  157. swap(ask->private, private);
  158. err = 0;
  159. unlock:
  160. release_sock(sk);
  161. alg_do_release(type, private);
  162. return err;
  163. }
  164. static int alg_setkey(struct sock *sk, char __user *ukey,
  165. unsigned int keylen)
  166. {
  167. struct alg_sock *ask = alg_sk(sk);
  168. const struct af_alg_type *type = ask->type;
  169. u8 *key;
  170. int err;
  171. key = sock_kmalloc(sk, keylen, GFP_KERNEL);
  172. if (!key)
  173. return -ENOMEM;
  174. err = -EFAULT;
  175. if (copy_from_user(key, ukey, keylen))
  176. goto out;
  177. err = type->setkey(ask->private, key, keylen);
  178. out:
  179. sock_kzfree_s(sk, key, keylen);
  180. return err;
  181. }
  182. static int alg_setsockopt(struct socket *sock, int level, int optname,
  183. char __user *optval, unsigned int optlen)
  184. {
  185. struct sock *sk = sock->sk;
  186. struct alg_sock *ask = alg_sk(sk);
  187. const struct af_alg_type *type;
  188. int err = -EBUSY;
  189. lock_sock(sk);
  190. if (ask->refcnt)
  191. goto unlock;
  192. type = ask->type;
  193. err = -ENOPROTOOPT;
  194. if (level != SOL_ALG || !type)
  195. goto unlock;
  196. switch (optname) {
  197. case ALG_SET_KEY:
  198. if (sock->state == SS_CONNECTED)
  199. goto unlock;
  200. if (!type->setkey)
  201. goto unlock;
  202. err = alg_setkey(sk, optval, optlen);
  203. break;
  204. case ALG_SET_AEAD_AUTHSIZE:
  205. if (sock->state == SS_CONNECTED)
  206. goto unlock;
  207. if (!type->setauthsize)
  208. goto unlock;
  209. err = type->setauthsize(ask->private, optlen);
  210. }
  211. unlock:
  212. release_sock(sk);
  213. return err;
  214. }
  215. int af_alg_accept(struct sock *sk, struct socket *newsock)
  216. {
  217. struct alg_sock *ask = alg_sk(sk);
  218. const struct af_alg_type *type;
  219. struct sock *sk2;
  220. unsigned int nokey;
  221. int err;
  222. lock_sock(sk);
  223. type = ask->type;
  224. err = -EINVAL;
  225. if (!type)
  226. goto unlock;
  227. sk2 = sk_alloc(sock_net(sk), PF_ALG, GFP_KERNEL, &alg_proto, 0);
  228. err = -ENOMEM;
  229. if (!sk2)
  230. goto unlock;
  231. sock_init_data(newsock, sk2);
  232. sock_graft(sk2, newsock);
  233. security_sk_clone(sk, sk2);
  234. err = type->accept(ask->private, sk2);
  235. nokey = err == -ENOKEY;
  236. if (nokey && type->accept_nokey)
  237. err = type->accept_nokey(ask->private, sk2);
  238. if (err)
  239. goto unlock;
  240. sk2->sk_family = PF_ALG;
  241. if (nokey || !ask->refcnt++)
  242. sock_hold(sk);
  243. ask->nokey_refcnt += nokey;
  244. alg_sk(sk2)->parent = sk;
  245. alg_sk(sk2)->type = type;
  246. alg_sk(sk2)->nokey_refcnt = nokey;
  247. newsock->ops = type->ops;
  248. newsock->state = SS_CONNECTED;
  249. if (nokey)
  250. newsock->ops = type->ops_nokey;
  251. err = 0;
  252. unlock:
  253. release_sock(sk);
  254. return err;
  255. }
  256. EXPORT_SYMBOL_GPL(af_alg_accept);
  257. static int alg_accept(struct socket *sock, struct socket *newsock, int flags)
  258. {
  259. return af_alg_accept(sock->sk, newsock);
  260. }
  261. static const struct proto_ops alg_proto_ops = {
  262. .family = PF_ALG,
  263. .owner = THIS_MODULE,
  264. .connect = sock_no_connect,
  265. .socketpair = sock_no_socketpair,
  266. .getname = sock_no_getname,
  267. .ioctl = sock_no_ioctl,
  268. .listen = sock_no_listen,
  269. .shutdown = sock_no_shutdown,
  270. .getsockopt = sock_no_getsockopt,
  271. .mmap = sock_no_mmap,
  272. .sendpage = sock_no_sendpage,
  273. .sendmsg = sock_no_sendmsg,
  274. .recvmsg = sock_no_recvmsg,
  275. .poll = sock_no_poll,
  276. .bind = alg_bind,
  277. .release = af_alg_release,
  278. .setsockopt = alg_setsockopt,
  279. .accept = alg_accept,
  280. };
  281. static void alg_sock_destruct(struct sock *sk)
  282. {
  283. struct alg_sock *ask = alg_sk(sk);
  284. alg_do_release(ask->type, ask->private);
  285. }
  286. static int alg_create(struct net *net, struct socket *sock, int protocol,
  287. int kern)
  288. {
  289. struct sock *sk;
  290. int err;
  291. if (sock->type != SOCK_SEQPACKET)
  292. return -ESOCKTNOSUPPORT;
  293. if (protocol != 0)
  294. return -EPROTONOSUPPORT;
  295. err = -ENOMEM;
  296. sk = sk_alloc(net, PF_ALG, GFP_KERNEL, &alg_proto, kern);
  297. if (!sk)
  298. goto out;
  299. sock->ops = &alg_proto_ops;
  300. sock_init_data(sock, sk);
  301. sk->sk_family = PF_ALG;
  302. sk->sk_destruct = alg_sock_destruct;
  303. return 0;
  304. out:
  305. return err;
  306. }
  307. static const struct net_proto_family alg_family = {
  308. .family = PF_ALG,
  309. .create = alg_create,
  310. .owner = THIS_MODULE,
  311. };
  312. int af_alg_make_sg(struct af_alg_sgl *sgl, struct iov_iter *iter, int len)
  313. {
  314. size_t off;
  315. ssize_t n;
  316. int npages, i;
  317. n = iov_iter_get_pages(iter, sgl->pages, len, ALG_MAX_PAGES, &off);
  318. if (n < 0)
  319. return n;
  320. npages = (off + n + PAGE_SIZE - 1) >> PAGE_SHIFT;
  321. if (WARN_ON(npages == 0))
  322. return -EINVAL;
  323. /* Add one extra for linking */
  324. sg_init_table(sgl->sg, npages + 1);
  325. for (i = 0, len = n; i < npages; i++) {
  326. int plen = min_t(int, len, PAGE_SIZE - off);
  327. sg_set_page(sgl->sg + i, sgl->pages[i], plen, off);
  328. off = 0;
  329. len -= plen;
  330. }
  331. sg_mark_end(sgl->sg + npages - 1);
  332. sgl->npages = npages;
  333. return n;
  334. }
  335. EXPORT_SYMBOL_GPL(af_alg_make_sg);
  336. void af_alg_link_sg(struct af_alg_sgl *sgl_prev, struct af_alg_sgl *sgl_new)
  337. {
  338. sg_unmark_end(sgl_prev->sg + sgl_prev->npages - 1);
  339. sg_chain(sgl_prev->sg, sgl_prev->npages + 1, sgl_new->sg);
  340. }
  341. EXPORT_SYMBOL_GPL(af_alg_link_sg);
  342. void af_alg_free_sg(struct af_alg_sgl *sgl)
  343. {
  344. int i;
  345. for (i = 0; i < sgl->npages; i++)
  346. put_page(sgl->pages[i]);
  347. }
  348. EXPORT_SYMBOL_GPL(af_alg_free_sg);
  349. int af_alg_cmsg_send(struct msghdr *msg, struct af_alg_control *con)
  350. {
  351. struct cmsghdr *cmsg;
  352. for_each_cmsghdr(cmsg, msg) {
  353. if (!CMSG_OK(msg, cmsg))
  354. return -EINVAL;
  355. if (cmsg->cmsg_level != SOL_ALG)
  356. continue;
  357. switch (cmsg->cmsg_type) {
  358. case ALG_SET_IV:
  359. if (cmsg->cmsg_len < CMSG_LEN(sizeof(*con->iv)))
  360. return -EINVAL;
  361. con->iv = (void *)CMSG_DATA(cmsg);
  362. if (cmsg->cmsg_len < CMSG_LEN(con->iv->ivlen +
  363. sizeof(*con->iv)))
  364. return -EINVAL;
  365. break;
  366. case ALG_SET_OP:
  367. if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32)))
  368. return -EINVAL;
  369. con->op = *(u32 *)CMSG_DATA(cmsg);
  370. break;
  371. case ALG_SET_AEAD_ASSOCLEN:
  372. if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32)))
  373. return -EINVAL;
  374. con->aead_assoclen = *(u32 *)CMSG_DATA(cmsg);
  375. break;
  376. default:
  377. return -EINVAL;
  378. }
  379. }
  380. return 0;
  381. }
  382. EXPORT_SYMBOL_GPL(af_alg_cmsg_send);
  383. int af_alg_wait_for_completion(int err, struct af_alg_completion *completion)
  384. {
  385. switch (err) {
  386. case -EINPROGRESS:
  387. case -EBUSY:
  388. wait_for_completion(&completion->completion);
  389. reinit_completion(&completion->completion);
  390. err = completion->err;
  391. break;
  392. };
  393. return err;
  394. }
  395. EXPORT_SYMBOL_GPL(af_alg_wait_for_completion);
  396. void af_alg_complete(struct crypto_async_request *req, int err)
  397. {
  398. struct af_alg_completion *completion = req->data;
  399. if (err == -EINPROGRESS)
  400. return;
  401. completion->err = err;
  402. complete(&completion->completion);
  403. }
  404. EXPORT_SYMBOL_GPL(af_alg_complete);
  405. static int __init af_alg_init(void)
  406. {
  407. int err = proto_register(&alg_proto, 0);
  408. if (err)
  409. goto out;
  410. err = sock_register(&alg_family);
  411. if (err != 0)
  412. goto out_unregister_proto;
  413. out:
  414. return err;
  415. out_unregister_proto:
  416. proto_unregister(&alg_proto);
  417. goto out;
  418. }
  419. static void __exit af_alg_exit(void)
  420. {
  421. sock_unregister(PF_ALG);
  422. proto_unregister(&alg_proto);
  423. }
  424. module_init(af_alg_init);
  425. module_exit(af_alg_exit);
  426. MODULE_LICENSE("GPL");
  427. MODULE_ALIAS_NETPROTO(AF_ALG);