162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * af_alg: User-space algorithm interface 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * This file provides the user-space API for algorithms. 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au> 862306a36Sopenharmony_ci */ 962306a36Sopenharmony_ci 1062306a36Sopenharmony_ci#include <linux/atomic.h> 1162306a36Sopenharmony_ci#include <crypto/if_alg.h> 1262306a36Sopenharmony_ci#include <linux/crypto.h> 1362306a36Sopenharmony_ci#include <linux/init.h> 1462306a36Sopenharmony_ci#include <linux/kernel.h> 1562306a36Sopenharmony_ci#include <linux/key.h> 1662306a36Sopenharmony_ci#include <linux/key-type.h> 1762306a36Sopenharmony_ci#include <linux/list.h> 1862306a36Sopenharmony_ci#include <linux/module.h> 1962306a36Sopenharmony_ci#include <linux/net.h> 2062306a36Sopenharmony_ci#include <linux/rwsem.h> 2162306a36Sopenharmony_ci#include <linux/sched.h> 2262306a36Sopenharmony_ci#include <linux/sched/signal.h> 2362306a36Sopenharmony_ci#include <linux/security.h> 2462306a36Sopenharmony_ci#include <linux/string.h> 2562306a36Sopenharmony_ci#include <keys/user-type.h> 2662306a36Sopenharmony_ci#include <keys/trusted-type.h> 2762306a36Sopenharmony_ci#include <keys/encrypted-type.h> 2862306a36Sopenharmony_ci 2962306a36Sopenharmony_cistruct alg_type_list { 3062306a36Sopenharmony_ci const struct af_alg_type *type; 3162306a36Sopenharmony_ci struct list_head list; 3262306a36Sopenharmony_ci}; 3362306a36Sopenharmony_ci 3462306a36Sopenharmony_cistatic struct proto alg_proto = { 3562306a36Sopenharmony_ci .name = "ALG", 3662306a36Sopenharmony_ci .owner = THIS_MODULE, 3762306a36Sopenharmony_ci .obj_size = sizeof(struct alg_sock), 3862306a36Sopenharmony_ci}; 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_cistatic LIST_HEAD(alg_types); 4162306a36Sopenharmony_cistatic DECLARE_RWSEM(alg_types_sem); 4262306a36Sopenharmony_ci 4362306a36Sopenharmony_cistatic const struct af_alg_type *alg_get_type(const char *name) 4462306a36Sopenharmony_ci{ 4562306a36Sopenharmony_ci const struct af_alg_type *type = ERR_PTR(-ENOENT); 4662306a36Sopenharmony_ci struct alg_type_list *node; 4762306a36Sopenharmony_ci 4862306a36Sopenharmony_ci down_read(&alg_types_sem); 4962306a36Sopenharmony_ci list_for_each_entry(node, &alg_types, list) { 5062306a36Sopenharmony_ci if (strcmp(node->type->name, name)) 5162306a36Sopenharmony_ci continue; 5262306a36Sopenharmony_ci 5362306a36Sopenharmony_ci if (try_module_get(node->type->owner)) 5462306a36Sopenharmony_ci type = node->type; 5562306a36Sopenharmony_ci break; 5662306a36Sopenharmony_ci } 5762306a36Sopenharmony_ci up_read(&alg_types_sem); 5862306a36Sopenharmony_ci 5962306a36Sopenharmony_ci return type; 6062306a36Sopenharmony_ci} 6162306a36Sopenharmony_ci 6262306a36Sopenharmony_ciint af_alg_register_type(const struct af_alg_type *type) 6362306a36Sopenharmony_ci{ 6462306a36Sopenharmony_ci struct alg_type_list *node; 6562306a36Sopenharmony_ci int err = -EEXIST; 6662306a36Sopenharmony_ci 6762306a36Sopenharmony_ci down_write(&alg_types_sem); 6862306a36Sopenharmony_ci list_for_each_entry(node, &alg_types, list) { 6962306a36Sopenharmony_ci if (!strcmp(node->type->name, type->name)) 7062306a36Sopenharmony_ci goto unlock; 7162306a36Sopenharmony_ci } 7262306a36Sopenharmony_ci 7362306a36Sopenharmony_ci node = kmalloc(sizeof(*node), GFP_KERNEL); 7462306a36Sopenharmony_ci err = -ENOMEM; 7562306a36Sopenharmony_ci if (!node) 7662306a36Sopenharmony_ci goto unlock; 7762306a36Sopenharmony_ci 7862306a36Sopenharmony_ci type->ops->owner = THIS_MODULE; 7962306a36Sopenharmony_ci if (type->ops_nokey) 8062306a36Sopenharmony_ci type->ops_nokey->owner = THIS_MODULE; 8162306a36Sopenharmony_ci node->type = type; 8262306a36Sopenharmony_ci list_add(&node->list, &alg_types); 8362306a36Sopenharmony_ci err = 0; 8462306a36Sopenharmony_ci 8562306a36Sopenharmony_ciunlock: 8662306a36Sopenharmony_ci up_write(&alg_types_sem); 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ci return err; 8962306a36Sopenharmony_ci} 9062306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_register_type); 9162306a36Sopenharmony_ci 9262306a36Sopenharmony_ciint af_alg_unregister_type(const struct af_alg_type *type) 9362306a36Sopenharmony_ci{ 9462306a36Sopenharmony_ci struct alg_type_list *node; 9562306a36Sopenharmony_ci int err = -ENOENT; 9662306a36Sopenharmony_ci 9762306a36Sopenharmony_ci down_write(&alg_types_sem); 9862306a36Sopenharmony_ci list_for_each_entry(node, &alg_types, list) { 9962306a36Sopenharmony_ci if (strcmp(node->type->name, type->name)) 10062306a36Sopenharmony_ci continue; 10162306a36Sopenharmony_ci 10262306a36Sopenharmony_ci list_del(&node->list); 10362306a36Sopenharmony_ci kfree(node); 10462306a36Sopenharmony_ci err = 0; 10562306a36Sopenharmony_ci break; 10662306a36Sopenharmony_ci } 10762306a36Sopenharmony_ci up_write(&alg_types_sem); 10862306a36Sopenharmony_ci 10962306a36Sopenharmony_ci return err; 11062306a36Sopenharmony_ci} 11162306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_unregister_type); 11262306a36Sopenharmony_ci 11362306a36Sopenharmony_cistatic void alg_do_release(const struct af_alg_type *type, void *private) 11462306a36Sopenharmony_ci{ 11562306a36Sopenharmony_ci if (!type) 11662306a36Sopenharmony_ci return; 11762306a36Sopenharmony_ci 11862306a36Sopenharmony_ci type->release(private); 11962306a36Sopenharmony_ci module_put(type->owner); 12062306a36Sopenharmony_ci} 12162306a36Sopenharmony_ci 12262306a36Sopenharmony_ciint af_alg_release(struct socket *sock) 12362306a36Sopenharmony_ci{ 12462306a36Sopenharmony_ci if (sock->sk) { 12562306a36Sopenharmony_ci sock_put(sock->sk); 12662306a36Sopenharmony_ci sock->sk = NULL; 12762306a36Sopenharmony_ci } 12862306a36Sopenharmony_ci return 0; 12962306a36Sopenharmony_ci} 13062306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_release); 13162306a36Sopenharmony_ci 13262306a36Sopenharmony_civoid af_alg_release_parent(struct sock *sk) 13362306a36Sopenharmony_ci{ 13462306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 13562306a36Sopenharmony_ci unsigned int nokey = atomic_read(&ask->nokey_refcnt); 13662306a36Sopenharmony_ci 13762306a36Sopenharmony_ci sk = ask->parent; 13862306a36Sopenharmony_ci ask = alg_sk(sk); 13962306a36Sopenharmony_ci 14062306a36Sopenharmony_ci if (nokey) 14162306a36Sopenharmony_ci atomic_dec(&ask->nokey_refcnt); 14262306a36Sopenharmony_ci 14362306a36Sopenharmony_ci if (atomic_dec_and_test(&ask->refcnt)) 14462306a36Sopenharmony_ci sock_put(sk); 14562306a36Sopenharmony_ci} 14662306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_release_parent); 14762306a36Sopenharmony_ci 14862306a36Sopenharmony_cistatic int alg_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len) 14962306a36Sopenharmony_ci{ 15062306a36Sopenharmony_ci const u32 allowed = CRYPTO_ALG_KERN_DRIVER_ONLY; 15162306a36Sopenharmony_ci struct sock *sk = sock->sk; 15262306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 15362306a36Sopenharmony_ci struct sockaddr_alg_new *sa = (void *)uaddr; 15462306a36Sopenharmony_ci const struct af_alg_type *type; 15562306a36Sopenharmony_ci void *private; 15662306a36Sopenharmony_ci int err; 15762306a36Sopenharmony_ci 15862306a36Sopenharmony_ci if (sock->state == SS_CONNECTED) 15962306a36Sopenharmony_ci return -EINVAL; 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_ci BUILD_BUG_ON(offsetof(struct sockaddr_alg_new, salg_name) != 16262306a36Sopenharmony_ci offsetof(struct sockaddr_alg, salg_name)); 16362306a36Sopenharmony_ci BUILD_BUG_ON(offsetof(struct sockaddr_alg, salg_name) != sizeof(*sa)); 16462306a36Sopenharmony_ci 16562306a36Sopenharmony_ci if (addr_len < sizeof(*sa) + 1) 16662306a36Sopenharmony_ci return -EINVAL; 16762306a36Sopenharmony_ci 16862306a36Sopenharmony_ci /* If caller uses non-allowed flag, return error. */ 16962306a36Sopenharmony_ci if ((sa->salg_feat & ~allowed) || (sa->salg_mask & ~allowed)) 17062306a36Sopenharmony_ci return -EINVAL; 17162306a36Sopenharmony_ci 17262306a36Sopenharmony_ci sa->salg_type[sizeof(sa->salg_type) - 1] = 0; 17362306a36Sopenharmony_ci sa->salg_name[addr_len - sizeof(*sa) - 1] = 0; 17462306a36Sopenharmony_ci 17562306a36Sopenharmony_ci type = alg_get_type(sa->salg_type); 17662306a36Sopenharmony_ci if (PTR_ERR(type) == -ENOENT) { 17762306a36Sopenharmony_ci request_module("algif-%s", sa->salg_type); 17862306a36Sopenharmony_ci type = alg_get_type(sa->salg_type); 17962306a36Sopenharmony_ci } 18062306a36Sopenharmony_ci 18162306a36Sopenharmony_ci if (IS_ERR(type)) 18262306a36Sopenharmony_ci return PTR_ERR(type); 18362306a36Sopenharmony_ci 18462306a36Sopenharmony_ci private = type->bind(sa->salg_name, sa->salg_feat, sa->salg_mask); 18562306a36Sopenharmony_ci if (IS_ERR(private)) { 18662306a36Sopenharmony_ci module_put(type->owner); 18762306a36Sopenharmony_ci return PTR_ERR(private); 18862306a36Sopenharmony_ci } 18962306a36Sopenharmony_ci 19062306a36Sopenharmony_ci err = -EBUSY; 19162306a36Sopenharmony_ci lock_sock(sk); 19262306a36Sopenharmony_ci if (atomic_read(&ask->refcnt)) 19362306a36Sopenharmony_ci goto unlock; 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci swap(ask->type, type); 19662306a36Sopenharmony_ci swap(ask->private, private); 19762306a36Sopenharmony_ci 19862306a36Sopenharmony_ci err = 0; 19962306a36Sopenharmony_ci 20062306a36Sopenharmony_ciunlock: 20162306a36Sopenharmony_ci release_sock(sk); 20262306a36Sopenharmony_ci 20362306a36Sopenharmony_ci alg_do_release(type, private); 20462306a36Sopenharmony_ci 20562306a36Sopenharmony_ci return err; 20662306a36Sopenharmony_ci} 20762306a36Sopenharmony_ci 20862306a36Sopenharmony_cistatic int alg_setkey(struct sock *sk, sockptr_t ukey, unsigned int keylen) 20962306a36Sopenharmony_ci{ 21062306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 21162306a36Sopenharmony_ci const struct af_alg_type *type = ask->type; 21262306a36Sopenharmony_ci u8 *key; 21362306a36Sopenharmony_ci int err; 21462306a36Sopenharmony_ci 21562306a36Sopenharmony_ci key = sock_kmalloc(sk, keylen, GFP_KERNEL); 21662306a36Sopenharmony_ci if (!key) 21762306a36Sopenharmony_ci return -ENOMEM; 21862306a36Sopenharmony_ci 21962306a36Sopenharmony_ci err = -EFAULT; 22062306a36Sopenharmony_ci if (copy_from_sockptr(key, ukey, keylen)) 22162306a36Sopenharmony_ci goto out; 22262306a36Sopenharmony_ci 22362306a36Sopenharmony_ci err = type->setkey(ask->private, key, keylen); 22462306a36Sopenharmony_ci 22562306a36Sopenharmony_ciout: 22662306a36Sopenharmony_ci sock_kzfree_s(sk, key, keylen); 22762306a36Sopenharmony_ci 22862306a36Sopenharmony_ci return err; 22962306a36Sopenharmony_ci} 23062306a36Sopenharmony_ci 23162306a36Sopenharmony_ci#ifdef CONFIG_KEYS 23262306a36Sopenharmony_ci 23362306a36Sopenharmony_cistatic const u8 *key_data_ptr_user(const struct key *key, 23462306a36Sopenharmony_ci unsigned int *datalen) 23562306a36Sopenharmony_ci{ 23662306a36Sopenharmony_ci const struct user_key_payload *ukp; 23762306a36Sopenharmony_ci 23862306a36Sopenharmony_ci ukp = user_key_payload_locked(key); 23962306a36Sopenharmony_ci if (IS_ERR_OR_NULL(ukp)) 24062306a36Sopenharmony_ci return ERR_PTR(-EKEYREVOKED); 24162306a36Sopenharmony_ci 24262306a36Sopenharmony_ci *datalen = key->datalen; 24362306a36Sopenharmony_ci 24462306a36Sopenharmony_ci return ukp->data; 24562306a36Sopenharmony_ci} 24662306a36Sopenharmony_ci 24762306a36Sopenharmony_cistatic const u8 *key_data_ptr_encrypted(const struct key *key, 24862306a36Sopenharmony_ci unsigned int *datalen) 24962306a36Sopenharmony_ci{ 25062306a36Sopenharmony_ci const struct encrypted_key_payload *ekp; 25162306a36Sopenharmony_ci 25262306a36Sopenharmony_ci ekp = dereference_key_locked(key); 25362306a36Sopenharmony_ci if (IS_ERR_OR_NULL(ekp)) 25462306a36Sopenharmony_ci return ERR_PTR(-EKEYREVOKED); 25562306a36Sopenharmony_ci 25662306a36Sopenharmony_ci *datalen = ekp->decrypted_datalen; 25762306a36Sopenharmony_ci 25862306a36Sopenharmony_ci return ekp->decrypted_data; 25962306a36Sopenharmony_ci} 26062306a36Sopenharmony_ci 26162306a36Sopenharmony_cistatic const u8 *key_data_ptr_trusted(const struct key *key, 26262306a36Sopenharmony_ci unsigned int *datalen) 26362306a36Sopenharmony_ci{ 26462306a36Sopenharmony_ci const struct trusted_key_payload *tkp; 26562306a36Sopenharmony_ci 26662306a36Sopenharmony_ci tkp = dereference_key_locked(key); 26762306a36Sopenharmony_ci if (IS_ERR_OR_NULL(tkp)) 26862306a36Sopenharmony_ci return ERR_PTR(-EKEYREVOKED); 26962306a36Sopenharmony_ci 27062306a36Sopenharmony_ci *datalen = tkp->key_len; 27162306a36Sopenharmony_ci 27262306a36Sopenharmony_ci return tkp->key; 27362306a36Sopenharmony_ci} 27462306a36Sopenharmony_ci 27562306a36Sopenharmony_cistatic struct key *lookup_key(key_serial_t serial) 27662306a36Sopenharmony_ci{ 27762306a36Sopenharmony_ci key_ref_t key_ref; 27862306a36Sopenharmony_ci 27962306a36Sopenharmony_ci key_ref = lookup_user_key(serial, 0, KEY_NEED_SEARCH); 28062306a36Sopenharmony_ci if (IS_ERR(key_ref)) 28162306a36Sopenharmony_ci return ERR_CAST(key_ref); 28262306a36Sopenharmony_ci 28362306a36Sopenharmony_ci return key_ref_to_ptr(key_ref); 28462306a36Sopenharmony_ci} 28562306a36Sopenharmony_ci 28662306a36Sopenharmony_cistatic int alg_setkey_by_key_serial(struct alg_sock *ask, sockptr_t optval, 28762306a36Sopenharmony_ci unsigned int optlen) 28862306a36Sopenharmony_ci{ 28962306a36Sopenharmony_ci const struct af_alg_type *type = ask->type; 29062306a36Sopenharmony_ci u8 *key_data = NULL; 29162306a36Sopenharmony_ci unsigned int key_datalen; 29262306a36Sopenharmony_ci key_serial_t serial; 29362306a36Sopenharmony_ci struct key *key; 29462306a36Sopenharmony_ci const u8 *ret; 29562306a36Sopenharmony_ci int err; 29662306a36Sopenharmony_ci 29762306a36Sopenharmony_ci if (optlen != sizeof(serial)) 29862306a36Sopenharmony_ci return -EINVAL; 29962306a36Sopenharmony_ci 30062306a36Sopenharmony_ci if (copy_from_sockptr(&serial, optval, optlen)) 30162306a36Sopenharmony_ci return -EFAULT; 30262306a36Sopenharmony_ci 30362306a36Sopenharmony_ci key = lookup_key(serial); 30462306a36Sopenharmony_ci if (IS_ERR(key)) 30562306a36Sopenharmony_ci return PTR_ERR(key); 30662306a36Sopenharmony_ci 30762306a36Sopenharmony_ci down_read(&key->sem); 30862306a36Sopenharmony_ci 30962306a36Sopenharmony_ci ret = ERR_PTR(-ENOPROTOOPT); 31062306a36Sopenharmony_ci if (!strcmp(key->type->name, "user") || 31162306a36Sopenharmony_ci !strcmp(key->type->name, "logon")) { 31262306a36Sopenharmony_ci ret = key_data_ptr_user(key, &key_datalen); 31362306a36Sopenharmony_ci } else if (IS_REACHABLE(CONFIG_ENCRYPTED_KEYS) && 31462306a36Sopenharmony_ci !strcmp(key->type->name, "encrypted")) { 31562306a36Sopenharmony_ci ret = key_data_ptr_encrypted(key, &key_datalen); 31662306a36Sopenharmony_ci } else if (IS_REACHABLE(CONFIG_TRUSTED_KEYS) && 31762306a36Sopenharmony_ci !strcmp(key->type->name, "trusted")) { 31862306a36Sopenharmony_ci ret = key_data_ptr_trusted(key, &key_datalen); 31962306a36Sopenharmony_ci } 32062306a36Sopenharmony_ci 32162306a36Sopenharmony_ci if (IS_ERR(ret)) { 32262306a36Sopenharmony_ci up_read(&key->sem); 32362306a36Sopenharmony_ci key_put(key); 32462306a36Sopenharmony_ci return PTR_ERR(ret); 32562306a36Sopenharmony_ci } 32662306a36Sopenharmony_ci 32762306a36Sopenharmony_ci key_data = sock_kmalloc(&ask->sk, key_datalen, GFP_KERNEL); 32862306a36Sopenharmony_ci if (!key_data) { 32962306a36Sopenharmony_ci up_read(&key->sem); 33062306a36Sopenharmony_ci key_put(key); 33162306a36Sopenharmony_ci return -ENOMEM; 33262306a36Sopenharmony_ci } 33362306a36Sopenharmony_ci 33462306a36Sopenharmony_ci memcpy(key_data, ret, key_datalen); 33562306a36Sopenharmony_ci 33662306a36Sopenharmony_ci up_read(&key->sem); 33762306a36Sopenharmony_ci key_put(key); 33862306a36Sopenharmony_ci 33962306a36Sopenharmony_ci err = type->setkey(ask->private, key_data, key_datalen); 34062306a36Sopenharmony_ci 34162306a36Sopenharmony_ci sock_kzfree_s(&ask->sk, key_data, key_datalen); 34262306a36Sopenharmony_ci 34362306a36Sopenharmony_ci return err; 34462306a36Sopenharmony_ci} 34562306a36Sopenharmony_ci 34662306a36Sopenharmony_ci#else 34762306a36Sopenharmony_ci 34862306a36Sopenharmony_cistatic inline int alg_setkey_by_key_serial(struct alg_sock *ask, 34962306a36Sopenharmony_ci sockptr_t optval, 35062306a36Sopenharmony_ci unsigned int optlen) 35162306a36Sopenharmony_ci{ 35262306a36Sopenharmony_ci return -ENOPROTOOPT; 35362306a36Sopenharmony_ci} 35462306a36Sopenharmony_ci 35562306a36Sopenharmony_ci#endif 35662306a36Sopenharmony_ci 35762306a36Sopenharmony_cistatic int alg_setsockopt(struct socket *sock, int level, int optname, 35862306a36Sopenharmony_ci sockptr_t optval, unsigned int optlen) 35962306a36Sopenharmony_ci{ 36062306a36Sopenharmony_ci struct sock *sk = sock->sk; 36162306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 36262306a36Sopenharmony_ci const struct af_alg_type *type; 36362306a36Sopenharmony_ci int err = -EBUSY; 36462306a36Sopenharmony_ci 36562306a36Sopenharmony_ci lock_sock(sk); 36662306a36Sopenharmony_ci if (atomic_read(&ask->refcnt) != atomic_read(&ask->nokey_refcnt)) 36762306a36Sopenharmony_ci goto unlock; 36862306a36Sopenharmony_ci 36962306a36Sopenharmony_ci type = ask->type; 37062306a36Sopenharmony_ci 37162306a36Sopenharmony_ci err = -ENOPROTOOPT; 37262306a36Sopenharmony_ci if (level != SOL_ALG || !type) 37362306a36Sopenharmony_ci goto unlock; 37462306a36Sopenharmony_ci 37562306a36Sopenharmony_ci switch (optname) { 37662306a36Sopenharmony_ci case ALG_SET_KEY: 37762306a36Sopenharmony_ci case ALG_SET_KEY_BY_KEY_SERIAL: 37862306a36Sopenharmony_ci if (sock->state == SS_CONNECTED) 37962306a36Sopenharmony_ci goto unlock; 38062306a36Sopenharmony_ci if (!type->setkey) 38162306a36Sopenharmony_ci goto unlock; 38262306a36Sopenharmony_ci 38362306a36Sopenharmony_ci if (optname == ALG_SET_KEY_BY_KEY_SERIAL) 38462306a36Sopenharmony_ci err = alg_setkey_by_key_serial(ask, optval, optlen); 38562306a36Sopenharmony_ci else 38662306a36Sopenharmony_ci err = alg_setkey(sk, optval, optlen); 38762306a36Sopenharmony_ci break; 38862306a36Sopenharmony_ci case ALG_SET_AEAD_AUTHSIZE: 38962306a36Sopenharmony_ci if (sock->state == SS_CONNECTED) 39062306a36Sopenharmony_ci goto unlock; 39162306a36Sopenharmony_ci if (!type->setauthsize) 39262306a36Sopenharmony_ci goto unlock; 39362306a36Sopenharmony_ci err = type->setauthsize(ask->private, optlen); 39462306a36Sopenharmony_ci break; 39562306a36Sopenharmony_ci case ALG_SET_DRBG_ENTROPY: 39662306a36Sopenharmony_ci if (sock->state == SS_CONNECTED) 39762306a36Sopenharmony_ci goto unlock; 39862306a36Sopenharmony_ci if (!type->setentropy) 39962306a36Sopenharmony_ci goto unlock; 40062306a36Sopenharmony_ci 40162306a36Sopenharmony_ci err = type->setentropy(ask->private, optval, optlen); 40262306a36Sopenharmony_ci } 40362306a36Sopenharmony_ci 40462306a36Sopenharmony_ciunlock: 40562306a36Sopenharmony_ci release_sock(sk); 40662306a36Sopenharmony_ci 40762306a36Sopenharmony_ci return err; 40862306a36Sopenharmony_ci} 40962306a36Sopenharmony_ci 41062306a36Sopenharmony_ciint af_alg_accept(struct sock *sk, struct socket *newsock, bool kern) 41162306a36Sopenharmony_ci{ 41262306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 41362306a36Sopenharmony_ci const struct af_alg_type *type; 41462306a36Sopenharmony_ci struct sock *sk2; 41562306a36Sopenharmony_ci unsigned int nokey; 41662306a36Sopenharmony_ci int err; 41762306a36Sopenharmony_ci 41862306a36Sopenharmony_ci lock_sock(sk); 41962306a36Sopenharmony_ci type = ask->type; 42062306a36Sopenharmony_ci 42162306a36Sopenharmony_ci err = -EINVAL; 42262306a36Sopenharmony_ci if (!type) 42362306a36Sopenharmony_ci goto unlock; 42462306a36Sopenharmony_ci 42562306a36Sopenharmony_ci sk2 = sk_alloc(sock_net(sk), PF_ALG, GFP_KERNEL, &alg_proto, kern); 42662306a36Sopenharmony_ci err = -ENOMEM; 42762306a36Sopenharmony_ci if (!sk2) 42862306a36Sopenharmony_ci goto unlock; 42962306a36Sopenharmony_ci 43062306a36Sopenharmony_ci sock_init_data(newsock, sk2); 43162306a36Sopenharmony_ci security_sock_graft(sk2, newsock); 43262306a36Sopenharmony_ci security_sk_clone(sk, sk2); 43362306a36Sopenharmony_ci 43462306a36Sopenharmony_ci /* 43562306a36Sopenharmony_ci * newsock->ops assigned here to allow type->accept call to override 43662306a36Sopenharmony_ci * them when required. 43762306a36Sopenharmony_ci */ 43862306a36Sopenharmony_ci newsock->ops = type->ops; 43962306a36Sopenharmony_ci err = type->accept(ask->private, sk2); 44062306a36Sopenharmony_ci 44162306a36Sopenharmony_ci nokey = err == -ENOKEY; 44262306a36Sopenharmony_ci if (nokey && type->accept_nokey) 44362306a36Sopenharmony_ci err = type->accept_nokey(ask->private, sk2); 44462306a36Sopenharmony_ci 44562306a36Sopenharmony_ci if (err) 44662306a36Sopenharmony_ci goto unlock; 44762306a36Sopenharmony_ci 44862306a36Sopenharmony_ci if (atomic_inc_return_relaxed(&ask->refcnt) == 1) 44962306a36Sopenharmony_ci sock_hold(sk); 45062306a36Sopenharmony_ci if (nokey) { 45162306a36Sopenharmony_ci atomic_inc(&ask->nokey_refcnt); 45262306a36Sopenharmony_ci atomic_set(&alg_sk(sk2)->nokey_refcnt, 1); 45362306a36Sopenharmony_ci } 45462306a36Sopenharmony_ci alg_sk(sk2)->parent = sk; 45562306a36Sopenharmony_ci alg_sk(sk2)->type = type; 45662306a36Sopenharmony_ci 45762306a36Sopenharmony_ci newsock->state = SS_CONNECTED; 45862306a36Sopenharmony_ci 45962306a36Sopenharmony_ci if (nokey) 46062306a36Sopenharmony_ci newsock->ops = type->ops_nokey; 46162306a36Sopenharmony_ci 46262306a36Sopenharmony_ci err = 0; 46362306a36Sopenharmony_ci 46462306a36Sopenharmony_ciunlock: 46562306a36Sopenharmony_ci release_sock(sk); 46662306a36Sopenharmony_ci 46762306a36Sopenharmony_ci return err; 46862306a36Sopenharmony_ci} 46962306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_accept); 47062306a36Sopenharmony_ci 47162306a36Sopenharmony_cistatic int alg_accept(struct socket *sock, struct socket *newsock, int flags, 47262306a36Sopenharmony_ci bool kern) 47362306a36Sopenharmony_ci{ 47462306a36Sopenharmony_ci return af_alg_accept(sock->sk, newsock, kern); 47562306a36Sopenharmony_ci} 47662306a36Sopenharmony_ci 47762306a36Sopenharmony_cistatic const struct proto_ops alg_proto_ops = { 47862306a36Sopenharmony_ci .family = PF_ALG, 47962306a36Sopenharmony_ci .owner = THIS_MODULE, 48062306a36Sopenharmony_ci 48162306a36Sopenharmony_ci .connect = sock_no_connect, 48262306a36Sopenharmony_ci .socketpair = sock_no_socketpair, 48362306a36Sopenharmony_ci .getname = sock_no_getname, 48462306a36Sopenharmony_ci .ioctl = sock_no_ioctl, 48562306a36Sopenharmony_ci .listen = sock_no_listen, 48662306a36Sopenharmony_ci .shutdown = sock_no_shutdown, 48762306a36Sopenharmony_ci .mmap = sock_no_mmap, 48862306a36Sopenharmony_ci .sendmsg = sock_no_sendmsg, 48962306a36Sopenharmony_ci .recvmsg = sock_no_recvmsg, 49062306a36Sopenharmony_ci 49162306a36Sopenharmony_ci .bind = alg_bind, 49262306a36Sopenharmony_ci .release = af_alg_release, 49362306a36Sopenharmony_ci .setsockopt = alg_setsockopt, 49462306a36Sopenharmony_ci .accept = alg_accept, 49562306a36Sopenharmony_ci}; 49662306a36Sopenharmony_ci 49762306a36Sopenharmony_cistatic void alg_sock_destruct(struct sock *sk) 49862306a36Sopenharmony_ci{ 49962306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 50062306a36Sopenharmony_ci 50162306a36Sopenharmony_ci alg_do_release(ask->type, ask->private); 50262306a36Sopenharmony_ci} 50362306a36Sopenharmony_ci 50462306a36Sopenharmony_cistatic int alg_create(struct net *net, struct socket *sock, int protocol, 50562306a36Sopenharmony_ci int kern) 50662306a36Sopenharmony_ci{ 50762306a36Sopenharmony_ci struct sock *sk; 50862306a36Sopenharmony_ci int err; 50962306a36Sopenharmony_ci 51062306a36Sopenharmony_ci if (sock->type != SOCK_SEQPACKET) 51162306a36Sopenharmony_ci return -ESOCKTNOSUPPORT; 51262306a36Sopenharmony_ci if (protocol != 0) 51362306a36Sopenharmony_ci return -EPROTONOSUPPORT; 51462306a36Sopenharmony_ci 51562306a36Sopenharmony_ci err = -ENOMEM; 51662306a36Sopenharmony_ci sk = sk_alloc(net, PF_ALG, GFP_KERNEL, &alg_proto, kern); 51762306a36Sopenharmony_ci if (!sk) 51862306a36Sopenharmony_ci goto out; 51962306a36Sopenharmony_ci 52062306a36Sopenharmony_ci sock->ops = &alg_proto_ops; 52162306a36Sopenharmony_ci sock_init_data(sock, sk); 52262306a36Sopenharmony_ci 52362306a36Sopenharmony_ci sk->sk_destruct = alg_sock_destruct; 52462306a36Sopenharmony_ci 52562306a36Sopenharmony_ci return 0; 52662306a36Sopenharmony_ciout: 52762306a36Sopenharmony_ci return err; 52862306a36Sopenharmony_ci} 52962306a36Sopenharmony_ci 53062306a36Sopenharmony_cistatic const struct net_proto_family alg_family = { 53162306a36Sopenharmony_ci .family = PF_ALG, 53262306a36Sopenharmony_ci .create = alg_create, 53362306a36Sopenharmony_ci .owner = THIS_MODULE, 53462306a36Sopenharmony_ci}; 53562306a36Sopenharmony_ci 53662306a36Sopenharmony_cistatic void af_alg_link_sg(struct af_alg_sgl *sgl_prev, 53762306a36Sopenharmony_ci struct af_alg_sgl *sgl_new) 53862306a36Sopenharmony_ci{ 53962306a36Sopenharmony_ci sg_unmark_end(sgl_prev->sgt.sgl + sgl_prev->sgt.nents - 1); 54062306a36Sopenharmony_ci sg_chain(sgl_prev->sgt.sgl, sgl_prev->sgt.nents + 1, sgl_new->sgt.sgl); 54162306a36Sopenharmony_ci} 54262306a36Sopenharmony_ci 54362306a36Sopenharmony_civoid af_alg_free_sg(struct af_alg_sgl *sgl) 54462306a36Sopenharmony_ci{ 54562306a36Sopenharmony_ci int i; 54662306a36Sopenharmony_ci 54762306a36Sopenharmony_ci if (sgl->sgt.sgl) { 54862306a36Sopenharmony_ci if (sgl->need_unpin) 54962306a36Sopenharmony_ci for (i = 0; i < sgl->sgt.nents; i++) 55062306a36Sopenharmony_ci unpin_user_page(sg_page(&sgl->sgt.sgl[i])); 55162306a36Sopenharmony_ci if (sgl->sgt.sgl != sgl->sgl) 55262306a36Sopenharmony_ci kvfree(sgl->sgt.sgl); 55362306a36Sopenharmony_ci sgl->sgt.sgl = NULL; 55462306a36Sopenharmony_ci } 55562306a36Sopenharmony_ci} 55662306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_free_sg); 55762306a36Sopenharmony_ci 55862306a36Sopenharmony_cistatic int af_alg_cmsg_send(struct msghdr *msg, struct af_alg_control *con) 55962306a36Sopenharmony_ci{ 56062306a36Sopenharmony_ci struct cmsghdr *cmsg; 56162306a36Sopenharmony_ci 56262306a36Sopenharmony_ci for_each_cmsghdr(cmsg, msg) { 56362306a36Sopenharmony_ci if (!CMSG_OK(msg, cmsg)) 56462306a36Sopenharmony_ci return -EINVAL; 56562306a36Sopenharmony_ci if (cmsg->cmsg_level != SOL_ALG) 56662306a36Sopenharmony_ci continue; 56762306a36Sopenharmony_ci 56862306a36Sopenharmony_ci switch (cmsg->cmsg_type) { 56962306a36Sopenharmony_ci case ALG_SET_IV: 57062306a36Sopenharmony_ci if (cmsg->cmsg_len < CMSG_LEN(sizeof(*con->iv))) 57162306a36Sopenharmony_ci return -EINVAL; 57262306a36Sopenharmony_ci con->iv = (void *)CMSG_DATA(cmsg); 57362306a36Sopenharmony_ci if (cmsg->cmsg_len < CMSG_LEN(con->iv->ivlen + 57462306a36Sopenharmony_ci sizeof(*con->iv))) 57562306a36Sopenharmony_ci return -EINVAL; 57662306a36Sopenharmony_ci break; 57762306a36Sopenharmony_ci 57862306a36Sopenharmony_ci case ALG_SET_OP: 57962306a36Sopenharmony_ci if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32))) 58062306a36Sopenharmony_ci return -EINVAL; 58162306a36Sopenharmony_ci con->op = *(u32 *)CMSG_DATA(cmsg); 58262306a36Sopenharmony_ci break; 58362306a36Sopenharmony_ci 58462306a36Sopenharmony_ci case ALG_SET_AEAD_ASSOCLEN: 58562306a36Sopenharmony_ci if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32))) 58662306a36Sopenharmony_ci return -EINVAL; 58762306a36Sopenharmony_ci con->aead_assoclen = *(u32 *)CMSG_DATA(cmsg); 58862306a36Sopenharmony_ci break; 58962306a36Sopenharmony_ci 59062306a36Sopenharmony_ci default: 59162306a36Sopenharmony_ci return -EINVAL; 59262306a36Sopenharmony_ci } 59362306a36Sopenharmony_ci } 59462306a36Sopenharmony_ci 59562306a36Sopenharmony_ci return 0; 59662306a36Sopenharmony_ci} 59762306a36Sopenharmony_ci 59862306a36Sopenharmony_ci/** 59962306a36Sopenharmony_ci * af_alg_alloc_tsgl - allocate the TX SGL 60062306a36Sopenharmony_ci * 60162306a36Sopenharmony_ci * @sk: socket of connection to user space 60262306a36Sopenharmony_ci * Return: 0 upon success, < 0 upon error 60362306a36Sopenharmony_ci */ 60462306a36Sopenharmony_cistatic int af_alg_alloc_tsgl(struct sock *sk) 60562306a36Sopenharmony_ci{ 60662306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 60762306a36Sopenharmony_ci struct af_alg_ctx *ctx = ask->private; 60862306a36Sopenharmony_ci struct af_alg_tsgl *sgl; 60962306a36Sopenharmony_ci struct scatterlist *sg = NULL; 61062306a36Sopenharmony_ci 61162306a36Sopenharmony_ci sgl = list_entry(ctx->tsgl_list.prev, struct af_alg_tsgl, list); 61262306a36Sopenharmony_ci if (!list_empty(&ctx->tsgl_list)) 61362306a36Sopenharmony_ci sg = sgl->sg; 61462306a36Sopenharmony_ci 61562306a36Sopenharmony_ci if (!sg || sgl->cur >= MAX_SGL_ENTS) { 61662306a36Sopenharmony_ci sgl = sock_kmalloc(sk, 61762306a36Sopenharmony_ci struct_size(sgl, sg, (MAX_SGL_ENTS + 1)), 61862306a36Sopenharmony_ci GFP_KERNEL); 61962306a36Sopenharmony_ci if (!sgl) 62062306a36Sopenharmony_ci return -ENOMEM; 62162306a36Sopenharmony_ci 62262306a36Sopenharmony_ci sg_init_table(sgl->sg, MAX_SGL_ENTS + 1); 62362306a36Sopenharmony_ci sgl->cur = 0; 62462306a36Sopenharmony_ci 62562306a36Sopenharmony_ci if (sg) 62662306a36Sopenharmony_ci sg_chain(sg, MAX_SGL_ENTS + 1, sgl->sg); 62762306a36Sopenharmony_ci 62862306a36Sopenharmony_ci list_add_tail(&sgl->list, &ctx->tsgl_list); 62962306a36Sopenharmony_ci } 63062306a36Sopenharmony_ci 63162306a36Sopenharmony_ci return 0; 63262306a36Sopenharmony_ci} 63362306a36Sopenharmony_ci 63462306a36Sopenharmony_ci/** 63562306a36Sopenharmony_ci * af_alg_count_tsgl - Count number of TX SG entries 63662306a36Sopenharmony_ci * 63762306a36Sopenharmony_ci * The counting starts from the beginning of the SGL to @bytes. If 63862306a36Sopenharmony_ci * an @offset is provided, the counting of the SG entries starts at the @offset. 63962306a36Sopenharmony_ci * 64062306a36Sopenharmony_ci * @sk: socket of connection to user space 64162306a36Sopenharmony_ci * @bytes: Count the number of SG entries holding given number of bytes. 64262306a36Sopenharmony_ci * @offset: Start the counting of SG entries from the given offset. 64362306a36Sopenharmony_ci * Return: Number of TX SG entries found given the constraints 64462306a36Sopenharmony_ci */ 64562306a36Sopenharmony_ciunsigned int af_alg_count_tsgl(struct sock *sk, size_t bytes, size_t offset) 64662306a36Sopenharmony_ci{ 64762306a36Sopenharmony_ci const struct alg_sock *ask = alg_sk(sk); 64862306a36Sopenharmony_ci const struct af_alg_ctx *ctx = ask->private; 64962306a36Sopenharmony_ci const struct af_alg_tsgl *sgl; 65062306a36Sopenharmony_ci unsigned int i; 65162306a36Sopenharmony_ci unsigned int sgl_count = 0; 65262306a36Sopenharmony_ci 65362306a36Sopenharmony_ci if (!bytes) 65462306a36Sopenharmony_ci return 0; 65562306a36Sopenharmony_ci 65662306a36Sopenharmony_ci list_for_each_entry(sgl, &ctx->tsgl_list, list) { 65762306a36Sopenharmony_ci const struct scatterlist *sg = sgl->sg; 65862306a36Sopenharmony_ci 65962306a36Sopenharmony_ci for (i = 0; i < sgl->cur; i++) { 66062306a36Sopenharmony_ci size_t bytes_count; 66162306a36Sopenharmony_ci 66262306a36Sopenharmony_ci /* Skip offset */ 66362306a36Sopenharmony_ci if (offset >= sg[i].length) { 66462306a36Sopenharmony_ci offset -= sg[i].length; 66562306a36Sopenharmony_ci bytes -= sg[i].length; 66662306a36Sopenharmony_ci continue; 66762306a36Sopenharmony_ci } 66862306a36Sopenharmony_ci 66962306a36Sopenharmony_ci bytes_count = sg[i].length - offset; 67062306a36Sopenharmony_ci 67162306a36Sopenharmony_ci offset = 0; 67262306a36Sopenharmony_ci sgl_count++; 67362306a36Sopenharmony_ci 67462306a36Sopenharmony_ci /* If we have seen requested number of bytes, stop */ 67562306a36Sopenharmony_ci if (bytes_count >= bytes) 67662306a36Sopenharmony_ci return sgl_count; 67762306a36Sopenharmony_ci 67862306a36Sopenharmony_ci bytes -= bytes_count; 67962306a36Sopenharmony_ci } 68062306a36Sopenharmony_ci } 68162306a36Sopenharmony_ci 68262306a36Sopenharmony_ci return sgl_count; 68362306a36Sopenharmony_ci} 68462306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_count_tsgl); 68562306a36Sopenharmony_ci 68662306a36Sopenharmony_ci/** 68762306a36Sopenharmony_ci * af_alg_pull_tsgl - Release the specified buffers from TX SGL 68862306a36Sopenharmony_ci * 68962306a36Sopenharmony_ci * If @dst is non-null, reassign the pages to @dst. The caller must release 69062306a36Sopenharmony_ci * the pages. If @dst_offset is given only reassign the pages to @dst starting 69162306a36Sopenharmony_ci * at the @dst_offset (byte). The caller must ensure that @dst is large 69262306a36Sopenharmony_ci * enough (e.g. by using af_alg_count_tsgl with the same offset). 69362306a36Sopenharmony_ci * 69462306a36Sopenharmony_ci * @sk: socket of connection to user space 69562306a36Sopenharmony_ci * @used: Number of bytes to pull from TX SGL 69662306a36Sopenharmony_ci * @dst: If non-NULL, buffer is reassigned to dst SGL instead of releasing. The 69762306a36Sopenharmony_ci * caller must release the buffers in dst. 69862306a36Sopenharmony_ci * @dst_offset: Reassign the TX SGL from given offset. All buffers before 69962306a36Sopenharmony_ci * reaching the offset is released. 70062306a36Sopenharmony_ci */ 70162306a36Sopenharmony_civoid af_alg_pull_tsgl(struct sock *sk, size_t used, struct scatterlist *dst, 70262306a36Sopenharmony_ci size_t dst_offset) 70362306a36Sopenharmony_ci{ 70462306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 70562306a36Sopenharmony_ci struct af_alg_ctx *ctx = ask->private; 70662306a36Sopenharmony_ci struct af_alg_tsgl *sgl; 70762306a36Sopenharmony_ci struct scatterlist *sg; 70862306a36Sopenharmony_ci unsigned int i, j = 0; 70962306a36Sopenharmony_ci 71062306a36Sopenharmony_ci while (!list_empty(&ctx->tsgl_list)) { 71162306a36Sopenharmony_ci sgl = list_first_entry(&ctx->tsgl_list, struct af_alg_tsgl, 71262306a36Sopenharmony_ci list); 71362306a36Sopenharmony_ci sg = sgl->sg; 71462306a36Sopenharmony_ci 71562306a36Sopenharmony_ci for (i = 0; i < sgl->cur; i++) { 71662306a36Sopenharmony_ci size_t plen = min_t(size_t, used, sg[i].length); 71762306a36Sopenharmony_ci struct page *page = sg_page(sg + i); 71862306a36Sopenharmony_ci 71962306a36Sopenharmony_ci if (!page) 72062306a36Sopenharmony_ci continue; 72162306a36Sopenharmony_ci 72262306a36Sopenharmony_ci /* 72362306a36Sopenharmony_ci * Assumption: caller created af_alg_count_tsgl(len) 72462306a36Sopenharmony_ci * SG entries in dst. 72562306a36Sopenharmony_ci */ 72662306a36Sopenharmony_ci if (dst) { 72762306a36Sopenharmony_ci if (dst_offset >= plen) { 72862306a36Sopenharmony_ci /* discard page before offset */ 72962306a36Sopenharmony_ci dst_offset -= plen; 73062306a36Sopenharmony_ci } else { 73162306a36Sopenharmony_ci /* reassign page to dst after offset */ 73262306a36Sopenharmony_ci get_page(page); 73362306a36Sopenharmony_ci sg_set_page(dst + j, page, 73462306a36Sopenharmony_ci plen - dst_offset, 73562306a36Sopenharmony_ci sg[i].offset + dst_offset); 73662306a36Sopenharmony_ci dst_offset = 0; 73762306a36Sopenharmony_ci j++; 73862306a36Sopenharmony_ci } 73962306a36Sopenharmony_ci } 74062306a36Sopenharmony_ci 74162306a36Sopenharmony_ci sg[i].length -= plen; 74262306a36Sopenharmony_ci sg[i].offset += plen; 74362306a36Sopenharmony_ci 74462306a36Sopenharmony_ci used -= plen; 74562306a36Sopenharmony_ci ctx->used -= plen; 74662306a36Sopenharmony_ci 74762306a36Sopenharmony_ci if (sg[i].length) 74862306a36Sopenharmony_ci return; 74962306a36Sopenharmony_ci 75062306a36Sopenharmony_ci put_page(page); 75162306a36Sopenharmony_ci sg_assign_page(sg + i, NULL); 75262306a36Sopenharmony_ci } 75362306a36Sopenharmony_ci 75462306a36Sopenharmony_ci list_del(&sgl->list); 75562306a36Sopenharmony_ci sock_kfree_s(sk, sgl, struct_size(sgl, sg, MAX_SGL_ENTS + 1)); 75662306a36Sopenharmony_ci } 75762306a36Sopenharmony_ci 75862306a36Sopenharmony_ci if (!ctx->used) 75962306a36Sopenharmony_ci ctx->merge = 0; 76062306a36Sopenharmony_ci ctx->init = ctx->more; 76162306a36Sopenharmony_ci} 76262306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_pull_tsgl); 76362306a36Sopenharmony_ci 76462306a36Sopenharmony_ci/** 76562306a36Sopenharmony_ci * af_alg_free_areq_sgls - Release TX and RX SGLs of the request 76662306a36Sopenharmony_ci * 76762306a36Sopenharmony_ci * @areq: Request holding the TX and RX SGL 76862306a36Sopenharmony_ci */ 76962306a36Sopenharmony_cistatic void af_alg_free_areq_sgls(struct af_alg_async_req *areq) 77062306a36Sopenharmony_ci{ 77162306a36Sopenharmony_ci struct sock *sk = areq->sk; 77262306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 77362306a36Sopenharmony_ci struct af_alg_ctx *ctx = ask->private; 77462306a36Sopenharmony_ci struct af_alg_rsgl *rsgl, *tmp; 77562306a36Sopenharmony_ci struct scatterlist *tsgl; 77662306a36Sopenharmony_ci struct scatterlist *sg; 77762306a36Sopenharmony_ci unsigned int i; 77862306a36Sopenharmony_ci 77962306a36Sopenharmony_ci list_for_each_entry_safe(rsgl, tmp, &areq->rsgl_list, list) { 78062306a36Sopenharmony_ci atomic_sub(rsgl->sg_num_bytes, &ctx->rcvused); 78162306a36Sopenharmony_ci af_alg_free_sg(&rsgl->sgl); 78262306a36Sopenharmony_ci list_del(&rsgl->list); 78362306a36Sopenharmony_ci if (rsgl != &areq->first_rsgl) 78462306a36Sopenharmony_ci sock_kfree_s(sk, rsgl, sizeof(*rsgl)); 78562306a36Sopenharmony_ci } 78662306a36Sopenharmony_ci 78762306a36Sopenharmony_ci tsgl = areq->tsgl; 78862306a36Sopenharmony_ci if (tsgl) { 78962306a36Sopenharmony_ci for_each_sg(tsgl, sg, areq->tsgl_entries, i) { 79062306a36Sopenharmony_ci if (!sg_page(sg)) 79162306a36Sopenharmony_ci continue; 79262306a36Sopenharmony_ci put_page(sg_page(sg)); 79362306a36Sopenharmony_ci } 79462306a36Sopenharmony_ci 79562306a36Sopenharmony_ci sock_kfree_s(sk, tsgl, areq->tsgl_entries * sizeof(*tsgl)); 79662306a36Sopenharmony_ci } 79762306a36Sopenharmony_ci} 79862306a36Sopenharmony_ci 79962306a36Sopenharmony_ci/** 80062306a36Sopenharmony_ci * af_alg_wait_for_wmem - wait for availability of writable memory 80162306a36Sopenharmony_ci * 80262306a36Sopenharmony_ci * @sk: socket of connection to user space 80362306a36Sopenharmony_ci * @flags: If MSG_DONTWAIT is set, then only report if function would sleep 80462306a36Sopenharmony_ci * Return: 0 when writable memory is available, < 0 upon error 80562306a36Sopenharmony_ci */ 80662306a36Sopenharmony_cistatic int af_alg_wait_for_wmem(struct sock *sk, unsigned int flags) 80762306a36Sopenharmony_ci{ 80862306a36Sopenharmony_ci DEFINE_WAIT_FUNC(wait, woken_wake_function); 80962306a36Sopenharmony_ci int err = -ERESTARTSYS; 81062306a36Sopenharmony_ci long timeout; 81162306a36Sopenharmony_ci 81262306a36Sopenharmony_ci if (flags & MSG_DONTWAIT) 81362306a36Sopenharmony_ci return -EAGAIN; 81462306a36Sopenharmony_ci 81562306a36Sopenharmony_ci sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk); 81662306a36Sopenharmony_ci 81762306a36Sopenharmony_ci add_wait_queue(sk_sleep(sk), &wait); 81862306a36Sopenharmony_ci for (;;) { 81962306a36Sopenharmony_ci if (signal_pending(current)) 82062306a36Sopenharmony_ci break; 82162306a36Sopenharmony_ci timeout = MAX_SCHEDULE_TIMEOUT; 82262306a36Sopenharmony_ci if (sk_wait_event(sk, &timeout, af_alg_writable(sk), &wait)) { 82362306a36Sopenharmony_ci err = 0; 82462306a36Sopenharmony_ci break; 82562306a36Sopenharmony_ci } 82662306a36Sopenharmony_ci } 82762306a36Sopenharmony_ci remove_wait_queue(sk_sleep(sk), &wait); 82862306a36Sopenharmony_ci 82962306a36Sopenharmony_ci return err; 83062306a36Sopenharmony_ci} 83162306a36Sopenharmony_ci 83262306a36Sopenharmony_ci/** 83362306a36Sopenharmony_ci * af_alg_wmem_wakeup - wakeup caller when writable memory is available 83462306a36Sopenharmony_ci * 83562306a36Sopenharmony_ci * @sk: socket of connection to user space 83662306a36Sopenharmony_ci */ 83762306a36Sopenharmony_civoid af_alg_wmem_wakeup(struct sock *sk) 83862306a36Sopenharmony_ci{ 83962306a36Sopenharmony_ci struct socket_wq *wq; 84062306a36Sopenharmony_ci 84162306a36Sopenharmony_ci if (!af_alg_writable(sk)) 84262306a36Sopenharmony_ci return; 84362306a36Sopenharmony_ci 84462306a36Sopenharmony_ci rcu_read_lock(); 84562306a36Sopenharmony_ci wq = rcu_dereference(sk->sk_wq); 84662306a36Sopenharmony_ci if (skwq_has_sleeper(wq)) 84762306a36Sopenharmony_ci wake_up_interruptible_sync_poll(&wq->wait, EPOLLIN | 84862306a36Sopenharmony_ci EPOLLRDNORM | 84962306a36Sopenharmony_ci EPOLLRDBAND); 85062306a36Sopenharmony_ci sk_wake_async(sk, SOCK_WAKE_WAITD, POLL_IN); 85162306a36Sopenharmony_ci rcu_read_unlock(); 85262306a36Sopenharmony_ci} 85362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_wmem_wakeup); 85462306a36Sopenharmony_ci 85562306a36Sopenharmony_ci/** 85662306a36Sopenharmony_ci * af_alg_wait_for_data - wait for availability of TX data 85762306a36Sopenharmony_ci * 85862306a36Sopenharmony_ci * @sk: socket of connection to user space 85962306a36Sopenharmony_ci * @flags: If MSG_DONTWAIT is set, then only report if function would sleep 86062306a36Sopenharmony_ci * @min: Set to minimum request size if partial requests are allowed. 86162306a36Sopenharmony_ci * Return: 0 when writable memory is available, < 0 upon error 86262306a36Sopenharmony_ci */ 86362306a36Sopenharmony_ciint af_alg_wait_for_data(struct sock *sk, unsigned flags, unsigned min) 86462306a36Sopenharmony_ci{ 86562306a36Sopenharmony_ci DEFINE_WAIT_FUNC(wait, woken_wake_function); 86662306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 86762306a36Sopenharmony_ci struct af_alg_ctx *ctx = ask->private; 86862306a36Sopenharmony_ci long timeout; 86962306a36Sopenharmony_ci int err = -ERESTARTSYS; 87062306a36Sopenharmony_ci 87162306a36Sopenharmony_ci if (flags & MSG_DONTWAIT) 87262306a36Sopenharmony_ci return -EAGAIN; 87362306a36Sopenharmony_ci 87462306a36Sopenharmony_ci sk_set_bit(SOCKWQ_ASYNC_WAITDATA, sk); 87562306a36Sopenharmony_ci 87662306a36Sopenharmony_ci add_wait_queue(sk_sleep(sk), &wait); 87762306a36Sopenharmony_ci for (;;) { 87862306a36Sopenharmony_ci if (signal_pending(current)) 87962306a36Sopenharmony_ci break; 88062306a36Sopenharmony_ci timeout = MAX_SCHEDULE_TIMEOUT; 88162306a36Sopenharmony_ci if (sk_wait_event(sk, &timeout, 88262306a36Sopenharmony_ci ctx->init && (!ctx->more || 88362306a36Sopenharmony_ci (min && ctx->used >= min)), 88462306a36Sopenharmony_ci &wait)) { 88562306a36Sopenharmony_ci err = 0; 88662306a36Sopenharmony_ci break; 88762306a36Sopenharmony_ci } 88862306a36Sopenharmony_ci } 88962306a36Sopenharmony_ci remove_wait_queue(sk_sleep(sk), &wait); 89062306a36Sopenharmony_ci 89162306a36Sopenharmony_ci sk_clear_bit(SOCKWQ_ASYNC_WAITDATA, sk); 89262306a36Sopenharmony_ci 89362306a36Sopenharmony_ci return err; 89462306a36Sopenharmony_ci} 89562306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_wait_for_data); 89662306a36Sopenharmony_ci 89762306a36Sopenharmony_ci/** 89862306a36Sopenharmony_ci * af_alg_data_wakeup - wakeup caller when new data can be sent to kernel 89962306a36Sopenharmony_ci * 90062306a36Sopenharmony_ci * @sk: socket of connection to user space 90162306a36Sopenharmony_ci */ 90262306a36Sopenharmony_cistatic void af_alg_data_wakeup(struct sock *sk) 90362306a36Sopenharmony_ci{ 90462306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 90562306a36Sopenharmony_ci struct af_alg_ctx *ctx = ask->private; 90662306a36Sopenharmony_ci struct socket_wq *wq; 90762306a36Sopenharmony_ci 90862306a36Sopenharmony_ci if (!ctx->used) 90962306a36Sopenharmony_ci return; 91062306a36Sopenharmony_ci 91162306a36Sopenharmony_ci rcu_read_lock(); 91262306a36Sopenharmony_ci wq = rcu_dereference(sk->sk_wq); 91362306a36Sopenharmony_ci if (skwq_has_sleeper(wq)) 91462306a36Sopenharmony_ci wake_up_interruptible_sync_poll(&wq->wait, EPOLLOUT | 91562306a36Sopenharmony_ci EPOLLRDNORM | 91662306a36Sopenharmony_ci EPOLLRDBAND); 91762306a36Sopenharmony_ci sk_wake_async(sk, SOCK_WAKE_SPACE, POLL_OUT); 91862306a36Sopenharmony_ci rcu_read_unlock(); 91962306a36Sopenharmony_ci} 92062306a36Sopenharmony_ci 92162306a36Sopenharmony_ci/** 92262306a36Sopenharmony_ci * af_alg_sendmsg - implementation of sendmsg system call handler 92362306a36Sopenharmony_ci * 92462306a36Sopenharmony_ci * The sendmsg system call handler obtains the user data and stores it 92562306a36Sopenharmony_ci * in ctx->tsgl_list. This implies allocation of the required numbers of 92662306a36Sopenharmony_ci * struct af_alg_tsgl. 92762306a36Sopenharmony_ci * 92862306a36Sopenharmony_ci * In addition, the ctx is filled with the information sent via CMSG. 92962306a36Sopenharmony_ci * 93062306a36Sopenharmony_ci * @sock: socket of connection to user space 93162306a36Sopenharmony_ci * @msg: message from user space 93262306a36Sopenharmony_ci * @size: size of message from user space 93362306a36Sopenharmony_ci * @ivsize: the size of the IV for the cipher operation to verify that the 93462306a36Sopenharmony_ci * user-space-provided IV has the right size 93562306a36Sopenharmony_ci * Return: the number of copied data upon success, < 0 upon error 93662306a36Sopenharmony_ci */ 93762306a36Sopenharmony_ciint af_alg_sendmsg(struct socket *sock, struct msghdr *msg, size_t size, 93862306a36Sopenharmony_ci unsigned int ivsize) 93962306a36Sopenharmony_ci{ 94062306a36Sopenharmony_ci struct sock *sk = sock->sk; 94162306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 94262306a36Sopenharmony_ci struct af_alg_ctx *ctx = ask->private; 94362306a36Sopenharmony_ci struct af_alg_tsgl *sgl; 94462306a36Sopenharmony_ci struct af_alg_control con = {}; 94562306a36Sopenharmony_ci long copied = 0; 94662306a36Sopenharmony_ci bool enc = false; 94762306a36Sopenharmony_ci bool init = false; 94862306a36Sopenharmony_ci int err = 0; 94962306a36Sopenharmony_ci 95062306a36Sopenharmony_ci if (msg->msg_controllen) { 95162306a36Sopenharmony_ci err = af_alg_cmsg_send(msg, &con); 95262306a36Sopenharmony_ci if (err) 95362306a36Sopenharmony_ci return err; 95462306a36Sopenharmony_ci 95562306a36Sopenharmony_ci init = true; 95662306a36Sopenharmony_ci switch (con.op) { 95762306a36Sopenharmony_ci case ALG_OP_ENCRYPT: 95862306a36Sopenharmony_ci enc = true; 95962306a36Sopenharmony_ci break; 96062306a36Sopenharmony_ci case ALG_OP_DECRYPT: 96162306a36Sopenharmony_ci enc = false; 96262306a36Sopenharmony_ci break; 96362306a36Sopenharmony_ci default: 96462306a36Sopenharmony_ci return -EINVAL; 96562306a36Sopenharmony_ci } 96662306a36Sopenharmony_ci 96762306a36Sopenharmony_ci if (con.iv && con.iv->ivlen != ivsize) 96862306a36Sopenharmony_ci return -EINVAL; 96962306a36Sopenharmony_ci } 97062306a36Sopenharmony_ci 97162306a36Sopenharmony_ci lock_sock(sk); 97262306a36Sopenharmony_ci if (ctx->init && !ctx->more) { 97362306a36Sopenharmony_ci if (ctx->used) { 97462306a36Sopenharmony_ci err = -EINVAL; 97562306a36Sopenharmony_ci goto unlock; 97662306a36Sopenharmony_ci } 97762306a36Sopenharmony_ci 97862306a36Sopenharmony_ci pr_info_once( 97962306a36Sopenharmony_ci "%s sent an empty control message without MSG_MORE.\n", 98062306a36Sopenharmony_ci current->comm); 98162306a36Sopenharmony_ci } 98262306a36Sopenharmony_ci ctx->init = true; 98362306a36Sopenharmony_ci 98462306a36Sopenharmony_ci if (init) { 98562306a36Sopenharmony_ci ctx->enc = enc; 98662306a36Sopenharmony_ci if (con.iv) 98762306a36Sopenharmony_ci memcpy(ctx->iv, con.iv->iv, ivsize); 98862306a36Sopenharmony_ci 98962306a36Sopenharmony_ci ctx->aead_assoclen = con.aead_assoclen; 99062306a36Sopenharmony_ci } 99162306a36Sopenharmony_ci 99262306a36Sopenharmony_ci while (size) { 99362306a36Sopenharmony_ci struct scatterlist *sg; 99462306a36Sopenharmony_ci size_t len = size; 99562306a36Sopenharmony_ci ssize_t plen; 99662306a36Sopenharmony_ci 99762306a36Sopenharmony_ci /* use the existing memory in an allocated page */ 99862306a36Sopenharmony_ci if (ctx->merge && !(msg->msg_flags & MSG_SPLICE_PAGES)) { 99962306a36Sopenharmony_ci sgl = list_entry(ctx->tsgl_list.prev, 100062306a36Sopenharmony_ci struct af_alg_tsgl, list); 100162306a36Sopenharmony_ci sg = sgl->sg + sgl->cur - 1; 100262306a36Sopenharmony_ci len = min_t(size_t, len, 100362306a36Sopenharmony_ci PAGE_SIZE - sg->offset - sg->length); 100462306a36Sopenharmony_ci 100562306a36Sopenharmony_ci err = memcpy_from_msg(page_address(sg_page(sg)) + 100662306a36Sopenharmony_ci sg->offset + sg->length, 100762306a36Sopenharmony_ci msg, len); 100862306a36Sopenharmony_ci if (err) 100962306a36Sopenharmony_ci goto unlock; 101062306a36Sopenharmony_ci 101162306a36Sopenharmony_ci sg->length += len; 101262306a36Sopenharmony_ci ctx->merge = (sg->offset + sg->length) & 101362306a36Sopenharmony_ci (PAGE_SIZE - 1); 101462306a36Sopenharmony_ci 101562306a36Sopenharmony_ci ctx->used += len; 101662306a36Sopenharmony_ci copied += len; 101762306a36Sopenharmony_ci size -= len; 101862306a36Sopenharmony_ci continue; 101962306a36Sopenharmony_ci } 102062306a36Sopenharmony_ci 102162306a36Sopenharmony_ci if (!af_alg_writable(sk)) { 102262306a36Sopenharmony_ci err = af_alg_wait_for_wmem(sk, msg->msg_flags); 102362306a36Sopenharmony_ci if (err) 102462306a36Sopenharmony_ci goto unlock; 102562306a36Sopenharmony_ci } 102662306a36Sopenharmony_ci 102762306a36Sopenharmony_ci /* allocate a new page */ 102862306a36Sopenharmony_ci len = min_t(unsigned long, len, af_alg_sndbuf(sk)); 102962306a36Sopenharmony_ci 103062306a36Sopenharmony_ci err = af_alg_alloc_tsgl(sk); 103162306a36Sopenharmony_ci if (err) 103262306a36Sopenharmony_ci goto unlock; 103362306a36Sopenharmony_ci 103462306a36Sopenharmony_ci sgl = list_entry(ctx->tsgl_list.prev, struct af_alg_tsgl, 103562306a36Sopenharmony_ci list); 103662306a36Sopenharmony_ci sg = sgl->sg; 103762306a36Sopenharmony_ci if (sgl->cur) 103862306a36Sopenharmony_ci sg_unmark_end(sg + sgl->cur - 1); 103962306a36Sopenharmony_ci 104062306a36Sopenharmony_ci if (msg->msg_flags & MSG_SPLICE_PAGES) { 104162306a36Sopenharmony_ci struct sg_table sgtable = { 104262306a36Sopenharmony_ci .sgl = sg, 104362306a36Sopenharmony_ci .nents = sgl->cur, 104462306a36Sopenharmony_ci .orig_nents = sgl->cur, 104562306a36Sopenharmony_ci }; 104662306a36Sopenharmony_ci 104762306a36Sopenharmony_ci plen = extract_iter_to_sg(&msg->msg_iter, len, &sgtable, 104862306a36Sopenharmony_ci MAX_SGL_ENTS - sgl->cur, 0); 104962306a36Sopenharmony_ci if (plen < 0) { 105062306a36Sopenharmony_ci err = plen; 105162306a36Sopenharmony_ci goto unlock; 105262306a36Sopenharmony_ci } 105362306a36Sopenharmony_ci 105462306a36Sopenharmony_ci for (; sgl->cur < sgtable.nents; sgl->cur++) 105562306a36Sopenharmony_ci get_page(sg_page(&sg[sgl->cur])); 105662306a36Sopenharmony_ci len -= plen; 105762306a36Sopenharmony_ci ctx->used += plen; 105862306a36Sopenharmony_ci copied += plen; 105962306a36Sopenharmony_ci size -= plen; 106062306a36Sopenharmony_ci ctx->merge = 0; 106162306a36Sopenharmony_ci } else { 106262306a36Sopenharmony_ci do { 106362306a36Sopenharmony_ci struct page *pg; 106462306a36Sopenharmony_ci unsigned int i = sgl->cur; 106562306a36Sopenharmony_ci 106662306a36Sopenharmony_ci plen = min_t(size_t, len, PAGE_SIZE); 106762306a36Sopenharmony_ci 106862306a36Sopenharmony_ci pg = alloc_page(GFP_KERNEL); 106962306a36Sopenharmony_ci if (!pg) { 107062306a36Sopenharmony_ci err = -ENOMEM; 107162306a36Sopenharmony_ci goto unlock; 107262306a36Sopenharmony_ci } 107362306a36Sopenharmony_ci 107462306a36Sopenharmony_ci sg_assign_page(sg + i, pg); 107562306a36Sopenharmony_ci 107662306a36Sopenharmony_ci err = memcpy_from_msg( 107762306a36Sopenharmony_ci page_address(sg_page(sg + i)), 107862306a36Sopenharmony_ci msg, plen); 107962306a36Sopenharmony_ci if (err) { 108062306a36Sopenharmony_ci __free_page(sg_page(sg + i)); 108162306a36Sopenharmony_ci sg_assign_page(sg + i, NULL); 108262306a36Sopenharmony_ci goto unlock; 108362306a36Sopenharmony_ci } 108462306a36Sopenharmony_ci 108562306a36Sopenharmony_ci sg[i].length = plen; 108662306a36Sopenharmony_ci len -= plen; 108762306a36Sopenharmony_ci ctx->used += plen; 108862306a36Sopenharmony_ci copied += plen; 108962306a36Sopenharmony_ci size -= plen; 109062306a36Sopenharmony_ci sgl->cur++; 109162306a36Sopenharmony_ci } while (len && sgl->cur < MAX_SGL_ENTS); 109262306a36Sopenharmony_ci 109362306a36Sopenharmony_ci ctx->merge = plen & (PAGE_SIZE - 1); 109462306a36Sopenharmony_ci } 109562306a36Sopenharmony_ci 109662306a36Sopenharmony_ci if (!size) 109762306a36Sopenharmony_ci sg_mark_end(sg + sgl->cur - 1); 109862306a36Sopenharmony_ci } 109962306a36Sopenharmony_ci 110062306a36Sopenharmony_ci err = 0; 110162306a36Sopenharmony_ci 110262306a36Sopenharmony_ci ctx->more = msg->msg_flags & MSG_MORE; 110362306a36Sopenharmony_ci 110462306a36Sopenharmony_ciunlock: 110562306a36Sopenharmony_ci af_alg_data_wakeup(sk); 110662306a36Sopenharmony_ci release_sock(sk); 110762306a36Sopenharmony_ci 110862306a36Sopenharmony_ci return copied ?: err; 110962306a36Sopenharmony_ci} 111062306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_sendmsg); 111162306a36Sopenharmony_ci 111262306a36Sopenharmony_ci/** 111362306a36Sopenharmony_ci * af_alg_free_resources - release resources required for crypto request 111462306a36Sopenharmony_ci * @areq: Request holding the TX and RX SGL 111562306a36Sopenharmony_ci */ 111662306a36Sopenharmony_civoid af_alg_free_resources(struct af_alg_async_req *areq) 111762306a36Sopenharmony_ci{ 111862306a36Sopenharmony_ci struct sock *sk = areq->sk; 111962306a36Sopenharmony_ci struct af_alg_ctx *ctx; 112062306a36Sopenharmony_ci 112162306a36Sopenharmony_ci af_alg_free_areq_sgls(areq); 112262306a36Sopenharmony_ci sock_kfree_s(sk, areq, areq->areqlen); 112362306a36Sopenharmony_ci 112462306a36Sopenharmony_ci ctx = alg_sk(sk)->private; 112562306a36Sopenharmony_ci ctx->inflight = false; 112662306a36Sopenharmony_ci} 112762306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_free_resources); 112862306a36Sopenharmony_ci 112962306a36Sopenharmony_ci/** 113062306a36Sopenharmony_ci * af_alg_async_cb - AIO callback handler 113162306a36Sopenharmony_ci * @data: async request completion data 113262306a36Sopenharmony_ci * @err: if non-zero, error result to be returned via ki_complete(); 113362306a36Sopenharmony_ci * otherwise return the AIO output length via ki_complete(). 113462306a36Sopenharmony_ci * 113562306a36Sopenharmony_ci * This handler cleans up the struct af_alg_async_req upon completion of the 113662306a36Sopenharmony_ci * AIO operation. 113762306a36Sopenharmony_ci * 113862306a36Sopenharmony_ci * The number of bytes to be generated with the AIO operation must be set 113962306a36Sopenharmony_ci * in areq->outlen before the AIO callback handler is invoked. 114062306a36Sopenharmony_ci */ 114162306a36Sopenharmony_civoid af_alg_async_cb(void *data, int err) 114262306a36Sopenharmony_ci{ 114362306a36Sopenharmony_ci struct af_alg_async_req *areq = data; 114462306a36Sopenharmony_ci struct sock *sk = areq->sk; 114562306a36Sopenharmony_ci struct kiocb *iocb = areq->iocb; 114662306a36Sopenharmony_ci unsigned int resultlen; 114762306a36Sopenharmony_ci 114862306a36Sopenharmony_ci /* Buffer size written by crypto operation. */ 114962306a36Sopenharmony_ci resultlen = areq->outlen; 115062306a36Sopenharmony_ci 115162306a36Sopenharmony_ci af_alg_free_resources(areq); 115262306a36Sopenharmony_ci sock_put(sk); 115362306a36Sopenharmony_ci 115462306a36Sopenharmony_ci iocb->ki_complete(iocb, err ? err : (int)resultlen); 115562306a36Sopenharmony_ci} 115662306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_async_cb); 115762306a36Sopenharmony_ci 115862306a36Sopenharmony_ci/** 115962306a36Sopenharmony_ci * af_alg_poll - poll system call handler 116062306a36Sopenharmony_ci * @file: file pointer 116162306a36Sopenharmony_ci * @sock: socket to poll 116262306a36Sopenharmony_ci * @wait: poll_table 116362306a36Sopenharmony_ci */ 116462306a36Sopenharmony_ci__poll_t af_alg_poll(struct file *file, struct socket *sock, 116562306a36Sopenharmony_ci poll_table *wait) 116662306a36Sopenharmony_ci{ 116762306a36Sopenharmony_ci struct sock *sk = sock->sk; 116862306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 116962306a36Sopenharmony_ci struct af_alg_ctx *ctx = ask->private; 117062306a36Sopenharmony_ci __poll_t mask; 117162306a36Sopenharmony_ci 117262306a36Sopenharmony_ci sock_poll_wait(file, sock, wait); 117362306a36Sopenharmony_ci mask = 0; 117462306a36Sopenharmony_ci 117562306a36Sopenharmony_ci if (!ctx->more || ctx->used) 117662306a36Sopenharmony_ci mask |= EPOLLIN | EPOLLRDNORM; 117762306a36Sopenharmony_ci 117862306a36Sopenharmony_ci if (af_alg_writable(sk)) 117962306a36Sopenharmony_ci mask |= EPOLLOUT | EPOLLWRNORM | EPOLLWRBAND; 118062306a36Sopenharmony_ci 118162306a36Sopenharmony_ci return mask; 118262306a36Sopenharmony_ci} 118362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_poll); 118462306a36Sopenharmony_ci 118562306a36Sopenharmony_ci/** 118662306a36Sopenharmony_ci * af_alg_alloc_areq - allocate struct af_alg_async_req 118762306a36Sopenharmony_ci * 118862306a36Sopenharmony_ci * @sk: socket of connection to user space 118962306a36Sopenharmony_ci * @areqlen: size of struct af_alg_async_req + crypto_*_reqsize 119062306a36Sopenharmony_ci * Return: allocated data structure or ERR_PTR upon error 119162306a36Sopenharmony_ci */ 119262306a36Sopenharmony_cistruct af_alg_async_req *af_alg_alloc_areq(struct sock *sk, 119362306a36Sopenharmony_ci unsigned int areqlen) 119462306a36Sopenharmony_ci{ 119562306a36Sopenharmony_ci struct af_alg_ctx *ctx = alg_sk(sk)->private; 119662306a36Sopenharmony_ci struct af_alg_async_req *areq; 119762306a36Sopenharmony_ci 119862306a36Sopenharmony_ci /* Only one AIO request can be in flight. */ 119962306a36Sopenharmony_ci if (ctx->inflight) 120062306a36Sopenharmony_ci return ERR_PTR(-EBUSY); 120162306a36Sopenharmony_ci 120262306a36Sopenharmony_ci areq = sock_kmalloc(sk, areqlen, GFP_KERNEL); 120362306a36Sopenharmony_ci if (unlikely(!areq)) 120462306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 120562306a36Sopenharmony_ci 120662306a36Sopenharmony_ci ctx->inflight = true; 120762306a36Sopenharmony_ci 120862306a36Sopenharmony_ci areq->areqlen = areqlen; 120962306a36Sopenharmony_ci areq->sk = sk; 121062306a36Sopenharmony_ci areq->first_rsgl.sgl.sgt.sgl = areq->first_rsgl.sgl.sgl; 121162306a36Sopenharmony_ci areq->last_rsgl = NULL; 121262306a36Sopenharmony_ci INIT_LIST_HEAD(&areq->rsgl_list); 121362306a36Sopenharmony_ci areq->tsgl = NULL; 121462306a36Sopenharmony_ci areq->tsgl_entries = 0; 121562306a36Sopenharmony_ci 121662306a36Sopenharmony_ci return areq; 121762306a36Sopenharmony_ci} 121862306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_alloc_areq); 121962306a36Sopenharmony_ci 122062306a36Sopenharmony_ci/** 122162306a36Sopenharmony_ci * af_alg_get_rsgl - create the RX SGL for the output data from the crypto 122262306a36Sopenharmony_ci * operation 122362306a36Sopenharmony_ci * 122462306a36Sopenharmony_ci * @sk: socket of connection to user space 122562306a36Sopenharmony_ci * @msg: user space message 122662306a36Sopenharmony_ci * @flags: flags used to invoke recvmsg with 122762306a36Sopenharmony_ci * @areq: instance of the cryptographic request that will hold the RX SGL 122862306a36Sopenharmony_ci * @maxsize: maximum number of bytes to be pulled from user space 122962306a36Sopenharmony_ci * @outlen: number of bytes in the RX SGL 123062306a36Sopenharmony_ci * Return: 0 on success, < 0 upon error 123162306a36Sopenharmony_ci */ 123262306a36Sopenharmony_ciint af_alg_get_rsgl(struct sock *sk, struct msghdr *msg, int flags, 123362306a36Sopenharmony_ci struct af_alg_async_req *areq, size_t maxsize, 123462306a36Sopenharmony_ci size_t *outlen) 123562306a36Sopenharmony_ci{ 123662306a36Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 123762306a36Sopenharmony_ci struct af_alg_ctx *ctx = ask->private; 123862306a36Sopenharmony_ci size_t len = 0; 123962306a36Sopenharmony_ci 124062306a36Sopenharmony_ci while (maxsize > len && msg_data_left(msg)) { 124162306a36Sopenharmony_ci struct af_alg_rsgl *rsgl; 124262306a36Sopenharmony_ci ssize_t err; 124362306a36Sopenharmony_ci size_t seglen; 124462306a36Sopenharmony_ci 124562306a36Sopenharmony_ci /* limit the amount of readable buffers */ 124662306a36Sopenharmony_ci if (!af_alg_readable(sk)) 124762306a36Sopenharmony_ci break; 124862306a36Sopenharmony_ci 124962306a36Sopenharmony_ci seglen = min_t(size_t, (maxsize - len), 125062306a36Sopenharmony_ci msg_data_left(msg)); 125162306a36Sopenharmony_ci 125262306a36Sopenharmony_ci if (list_empty(&areq->rsgl_list)) { 125362306a36Sopenharmony_ci rsgl = &areq->first_rsgl; 125462306a36Sopenharmony_ci } else { 125562306a36Sopenharmony_ci rsgl = sock_kmalloc(sk, sizeof(*rsgl), GFP_KERNEL); 125662306a36Sopenharmony_ci if (unlikely(!rsgl)) 125762306a36Sopenharmony_ci return -ENOMEM; 125862306a36Sopenharmony_ci } 125962306a36Sopenharmony_ci 126062306a36Sopenharmony_ci rsgl->sgl.need_unpin = 126162306a36Sopenharmony_ci iov_iter_extract_will_pin(&msg->msg_iter); 126262306a36Sopenharmony_ci rsgl->sgl.sgt.sgl = rsgl->sgl.sgl; 126362306a36Sopenharmony_ci rsgl->sgl.sgt.nents = 0; 126462306a36Sopenharmony_ci rsgl->sgl.sgt.orig_nents = 0; 126562306a36Sopenharmony_ci list_add_tail(&rsgl->list, &areq->rsgl_list); 126662306a36Sopenharmony_ci 126762306a36Sopenharmony_ci sg_init_table(rsgl->sgl.sgt.sgl, ALG_MAX_PAGES); 126862306a36Sopenharmony_ci err = extract_iter_to_sg(&msg->msg_iter, seglen, &rsgl->sgl.sgt, 126962306a36Sopenharmony_ci ALG_MAX_PAGES, 0); 127062306a36Sopenharmony_ci if (err < 0) { 127162306a36Sopenharmony_ci rsgl->sg_num_bytes = 0; 127262306a36Sopenharmony_ci return err; 127362306a36Sopenharmony_ci } 127462306a36Sopenharmony_ci 127562306a36Sopenharmony_ci sg_mark_end(rsgl->sgl.sgt.sgl + rsgl->sgl.sgt.nents - 1); 127662306a36Sopenharmony_ci 127762306a36Sopenharmony_ci /* chain the new scatterlist with previous one */ 127862306a36Sopenharmony_ci if (areq->last_rsgl) 127962306a36Sopenharmony_ci af_alg_link_sg(&areq->last_rsgl->sgl, &rsgl->sgl); 128062306a36Sopenharmony_ci 128162306a36Sopenharmony_ci areq->last_rsgl = rsgl; 128262306a36Sopenharmony_ci len += err; 128362306a36Sopenharmony_ci atomic_add(err, &ctx->rcvused); 128462306a36Sopenharmony_ci rsgl->sg_num_bytes = err; 128562306a36Sopenharmony_ci } 128662306a36Sopenharmony_ci 128762306a36Sopenharmony_ci *outlen = len; 128862306a36Sopenharmony_ci return 0; 128962306a36Sopenharmony_ci} 129062306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(af_alg_get_rsgl); 129162306a36Sopenharmony_ci 129262306a36Sopenharmony_cistatic int __init af_alg_init(void) 129362306a36Sopenharmony_ci{ 129462306a36Sopenharmony_ci int err = proto_register(&alg_proto, 0); 129562306a36Sopenharmony_ci 129662306a36Sopenharmony_ci if (err) 129762306a36Sopenharmony_ci goto out; 129862306a36Sopenharmony_ci 129962306a36Sopenharmony_ci err = sock_register(&alg_family); 130062306a36Sopenharmony_ci if (err != 0) 130162306a36Sopenharmony_ci goto out_unregister_proto; 130262306a36Sopenharmony_ci 130362306a36Sopenharmony_ciout: 130462306a36Sopenharmony_ci return err; 130562306a36Sopenharmony_ci 130662306a36Sopenharmony_ciout_unregister_proto: 130762306a36Sopenharmony_ci proto_unregister(&alg_proto); 130862306a36Sopenharmony_ci goto out; 130962306a36Sopenharmony_ci} 131062306a36Sopenharmony_ci 131162306a36Sopenharmony_cistatic void __exit af_alg_exit(void) 131262306a36Sopenharmony_ci{ 131362306a36Sopenharmony_ci sock_unregister(PF_ALG); 131462306a36Sopenharmony_ci proto_unregister(&alg_proto); 131562306a36Sopenharmony_ci} 131662306a36Sopenharmony_ci 131762306a36Sopenharmony_cimodule_init(af_alg_init); 131862306a36Sopenharmony_cimodule_exit(af_alg_exit); 131962306a36Sopenharmony_ciMODULE_LICENSE("GPL"); 132062306a36Sopenharmony_ciMODULE_ALIAS_NETPROTO(AF_ALG); 1321