x86: Add RO/NX protection for loadable kernel modules
[linux-2.6/linux-acpi-2.6/ibm-acpi-2.6.git] / crypto / proc.c
blob58fef67d4f4dbe9cb351c202be7518b003dfe893
1 /*
2 * Scatterlist Cryptographic API.
4 * Procfs information.
6 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
7 * Copyright (c) 2005 Herbert Xu <herbert@gondor.apana.org.au>
9 * This program is free software; you can redistribute it and/or modify it
10 * under the terms of the GNU General Public License as published by the Free
11 * Software Foundation; either version 2 of the License, or (at your option)
12 * any later version.
16 #include <asm/atomic.h>
17 #include <linux/init.h>
18 #include <linux/crypto.h>
19 #include <linux/rwsem.h>
20 #include <linux/proc_fs.h>
21 #include <linux/seq_file.h>
22 #include <linux/sysctl.h>
23 #include "internal.h"
25 #ifdef CONFIG_CRYPTO_FIPS
26 static struct ctl_table crypto_sysctl_table[] = {
28 .procname = "fips_enabled",
29 .data = &fips_enabled,
30 .maxlen = sizeof(int),
31 .mode = 0444,
32 .proc_handler = proc_dointvec
37 static struct ctl_table crypto_dir_table[] = {
39 .procname = "crypto",
40 .mode = 0555,
41 .child = crypto_sysctl_table
46 static struct ctl_table_header *crypto_sysctls;
48 static void crypto_proc_fips_init(void)
50 crypto_sysctls = register_sysctl_table(crypto_dir_table);
53 static void crypto_proc_fips_exit(void)
55 if (crypto_sysctls)
56 unregister_sysctl_table(crypto_sysctls);
58 #else
59 #define crypto_proc_fips_init()
60 #define crypto_proc_fips_exit()
61 #endif
63 static void *c_start(struct seq_file *m, loff_t *pos)
65 down_read(&crypto_alg_sem);
66 return seq_list_start(&crypto_alg_list, *pos);
69 static void *c_next(struct seq_file *m, void *p, loff_t *pos)
71 return seq_list_next(p, &crypto_alg_list, pos);
74 static void c_stop(struct seq_file *m, void *p)
76 up_read(&crypto_alg_sem);
79 static int c_show(struct seq_file *m, void *p)
81 struct crypto_alg *alg = list_entry(p, struct crypto_alg, cra_list);
83 seq_printf(m, "name : %s\n", alg->cra_name);
84 seq_printf(m, "driver : %s\n", alg->cra_driver_name);
85 seq_printf(m, "module : %s\n", module_name(alg->cra_module));
86 seq_printf(m, "priority : %d\n", alg->cra_priority);
87 seq_printf(m, "refcnt : %d\n", atomic_read(&alg->cra_refcnt));
88 seq_printf(m, "selftest : %s\n",
89 (alg->cra_flags & CRYPTO_ALG_TESTED) ?
90 "passed" : "unknown");
92 if (alg->cra_flags & CRYPTO_ALG_LARVAL) {
93 seq_printf(m, "type : larval\n");
94 seq_printf(m, "flags : 0x%x\n", alg->cra_flags);
95 goto out;
98 if (alg->cra_type && alg->cra_type->show) {
99 alg->cra_type->show(m, alg);
100 goto out;
103 switch (alg->cra_flags & (CRYPTO_ALG_TYPE_MASK | CRYPTO_ALG_LARVAL)) {
104 case CRYPTO_ALG_TYPE_CIPHER:
105 seq_printf(m, "type : cipher\n");
106 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize);
107 seq_printf(m, "min keysize : %u\n",
108 alg->cra_cipher.cia_min_keysize);
109 seq_printf(m, "max keysize : %u\n",
110 alg->cra_cipher.cia_max_keysize);
111 break;
112 case CRYPTO_ALG_TYPE_COMPRESS:
113 seq_printf(m, "type : compression\n");
114 break;
115 default:
116 seq_printf(m, "type : unknown\n");
117 break;
120 out:
121 seq_putc(m, '\n');
122 return 0;
125 static const struct seq_operations crypto_seq_ops = {
126 .start = c_start,
127 .next = c_next,
128 .stop = c_stop,
129 .show = c_show
132 static int crypto_info_open(struct inode *inode, struct file *file)
134 return seq_open(file, &crypto_seq_ops);
137 static const struct file_operations proc_crypto_ops = {
138 .open = crypto_info_open,
139 .read = seq_read,
140 .llseek = seq_lseek,
141 .release = seq_release
144 void __init crypto_init_proc(void)
146 proc_create("crypto", 0, NULL, &proc_crypto_ops);
147 crypto_proc_fips_init();
150 void __exit crypto_exit_proc(void)
152 crypto_proc_fips_exit();
153 remove_proc_entry("crypto", NULL);