mfd: Check for twl4030-madc NULL pointer
[linux-2.6/linux-acpi-2.6/ibm-acpi-2.6.git] / crypto / af_alg.c
blob940d70cb5c25513ae5ffccea5be9d986af8dfad1
1 /*
2 * af_alg: User-space algorithm interface
4 * This file provides the user-space API for algorithms.
6 * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
8 * This program is free software; you can redistribute it and/or modify it
9 * under the terms of the GNU General Public License as published by the Free
10 * Software Foundation; either version 2 of the License, or (at your option)
11 * any later version.
15 #include <asm/atomic.h>
16 #include <crypto/if_alg.h>
17 #include <linux/crypto.h>
18 #include <linux/init.h>
19 #include <linux/kernel.h>
20 #include <linux/list.h>
21 #include <linux/module.h>
22 #include <linux/net.h>
23 #include <linux/rwsem.h>
25 struct alg_type_list {
26 const struct af_alg_type *type;
27 struct list_head list;
30 static atomic_long_t alg_memory_allocated;
32 static struct proto alg_proto = {
33 .name = "ALG",
34 .owner = THIS_MODULE,
35 .memory_allocated = &alg_memory_allocated,
36 .obj_size = sizeof(struct alg_sock),
39 static LIST_HEAD(alg_types);
40 static DECLARE_RWSEM(alg_types_sem);
42 static const struct af_alg_type *alg_get_type(const char *name)
44 const struct af_alg_type *type = ERR_PTR(-ENOENT);
45 struct alg_type_list *node;
47 down_read(&alg_types_sem);
48 list_for_each_entry(node, &alg_types, list) {
49 if (strcmp(node->type->name, name))
50 continue;
52 if (try_module_get(node->type->owner))
53 type = node->type;
54 break;
56 up_read(&alg_types_sem);
58 return type;
61 int af_alg_register_type(const struct af_alg_type *type)
63 struct alg_type_list *node;
64 int err = -EEXIST;
66 down_write(&alg_types_sem);
67 list_for_each_entry(node, &alg_types, list) {
68 if (!strcmp(node->type->name, type->name))
69 goto unlock;
72 node = kmalloc(sizeof(*node), GFP_KERNEL);
73 err = -ENOMEM;
74 if (!node)
75 goto unlock;
77 type->ops->owner = THIS_MODULE;
78 node->type = type;
79 list_add(&node->list, &alg_types);
80 err = 0;
82 unlock:
83 up_write(&alg_types_sem);
85 return err;
87 EXPORT_SYMBOL_GPL(af_alg_register_type);
89 int af_alg_unregister_type(const struct af_alg_type *type)
91 struct alg_type_list *node;
92 int err = -ENOENT;
94 down_write(&alg_types_sem);
95 list_for_each_entry(node, &alg_types, list) {
96 if (strcmp(node->type->name, type->name))
97 continue;
99 list_del(&node->list);
100 kfree(node);
101 err = 0;
102 break;
104 up_write(&alg_types_sem);
106 return err;
108 EXPORT_SYMBOL_GPL(af_alg_unregister_type);
110 static void alg_do_release(const struct af_alg_type *type, void *private)
112 if (!type)
113 return;
115 type->release(private);
116 module_put(type->owner);
119 int af_alg_release(struct socket *sock)
121 if (sock->sk)
122 sock_put(sock->sk);
123 return 0;
125 EXPORT_SYMBOL_GPL(af_alg_release);
127 static int alg_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
129 struct sock *sk = sock->sk;
130 struct alg_sock *ask = alg_sk(sk);
131 struct sockaddr_alg *sa = (void *)uaddr;
132 const struct af_alg_type *type;
133 void *private;
135 if (sock->state == SS_CONNECTED)
136 return -EINVAL;
138 if (addr_len != sizeof(*sa))
139 return -EINVAL;
141 sa->salg_type[sizeof(sa->salg_type) - 1] = 0;
142 sa->salg_name[sizeof(sa->salg_name) - 1] = 0;
144 type = alg_get_type(sa->salg_type);
145 if (IS_ERR(type) && PTR_ERR(type) == -ENOENT) {
146 request_module("algif-%s", sa->salg_type);
147 type = alg_get_type(sa->salg_type);
150 if (IS_ERR(type))
151 return PTR_ERR(type);
153 private = type->bind(sa->salg_name, sa->salg_feat, sa->salg_mask);
154 if (IS_ERR(private)) {
155 module_put(type->owner);
156 return PTR_ERR(private);
159 lock_sock(sk);
161 swap(ask->type, type);
162 swap(ask->private, private);
164 release_sock(sk);
166 alg_do_release(type, private);
168 return 0;
171 static int alg_setkey(struct sock *sk, char __user *ukey,
172 unsigned int keylen)
174 struct alg_sock *ask = alg_sk(sk);
175 const struct af_alg_type *type = ask->type;
176 u8 *key;
177 int err;
179 key = sock_kmalloc(sk, keylen, GFP_KERNEL);
180 if (!key)
181 return -ENOMEM;
183 err = -EFAULT;
184 if (copy_from_user(key, ukey, keylen))
185 goto out;
187 err = type->setkey(ask->private, key, keylen);
189 out:
190 sock_kfree_s(sk, key, keylen);
192 return err;
195 static int alg_setsockopt(struct socket *sock, int level, int optname,
196 char __user *optval, unsigned int optlen)
198 struct sock *sk = sock->sk;
199 struct alg_sock *ask = alg_sk(sk);
200 const struct af_alg_type *type;
201 int err = -ENOPROTOOPT;
203 lock_sock(sk);
204 type = ask->type;
206 if (level != SOL_ALG || !type)
207 goto unlock;
209 switch (optname) {
210 case ALG_SET_KEY:
211 if (sock->state == SS_CONNECTED)
212 goto unlock;
213 if (!type->setkey)
214 goto unlock;
216 err = alg_setkey(sk, optval, optlen);
219 unlock:
220 release_sock(sk);
222 return err;
225 int af_alg_accept(struct sock *sk, struct socket *newsock)
227 struct alg_sock *ask = alg_sk(sk);
228 const struct af_alg_type *type;
229 struct sock *sk2;
230 int err;
232 lock_sock(sk);
233 type = ask->type;
235 err = -EINVAL;
236 if (!type)
237 goto unlock;
239 sk2 = sk_alloc(sock_net(sk), PF_ALG, GFP_KERNEL, &alg_proto);
240 err = -ENOMEM;
241 if (!sk2)
242 goto unlock;
244 sock_init_data(newsock, sk2);
245 sock_graft(sk2, newsock);
247 err = type->accept(ask->private, sk2);
248 if (err) {
249 sk_free(sk2);
250 goto unlock;
253 sk2->sk_family = PF_ALG;
255 sock_hold(sk);
256 alg_sk(sk2)->parent = sk;
257 alg_sk(sk2)->type = type;
259 newsock->ops = type->ops;
260 newsock->state = SS_CONNECTED;
262 err = 0;
264 unlock:
265 release_sock(sk);
267 return err;
269 EXPORT_SYMBOL_GPL(af_alg_accept);
271 static int alg_accept(struct socket *sock, struct socket *newsock, int flags)
273 return af_alg_accept(sock->sk, newsock);
276 static const struct proto_ops alg_proto_ops = {
277 .family = PF_ALG,
278 .owner = THIS_MODULE,
280 .connect = sock_no_connect,
281 .socketpair = sock_no_socketpair,
282 .getname = sock_no_getname,
283 .ioctl = sock_no_ioctl,
284 .listen = sock_no_listen,
285 .shutdown = sock_no_shutdown,
286 .getsockopt = sock_no_getsockopt,
287 .mmap = sock_no_mmap,
288 .sendpage = sock_no_sendpage,
289 .sendmsg = sock_no_sendmsg,
290 .recvmsg = sock_no_recvmsg,
291 .poll = sock_no_poll,
293 .bind = alg_bind,
294 .release = af_alg_release,
295 .setsockopt = alg_setsockopt,
296 .accept = alg_accept,
299 static void alg_sock_destruct(struct sock *sk)
301 struct alg_sock *ask = alg_sk(sk);
303 alg_do_release(ask->type, ask->private);
306 static int alg_create(struct net *net, struct socket *sock, int protocol,
307 int kern)
309 struct sock *sk;
310 int err;
312 if (sock->type != SOCK_SEQPACKET)
313 return -ESOCKTNOSUPPORT;
314 if (protocol != 0)
315 return -EPROTONOSUPPORT;
317 err = -ENOMEM;
318 sk = sk_alloc(net, PF_ALG, GFP_KERNEL, &alg_proto);
319 if (!sk)
320 goto out;
322 sock->ops = &alg_proto_ops;
323 sock_init_data(sock, sk);
325 sk->sk_family = PF_ALG;
326 sk->sk_destruct = alg_sock_destruct;
328 return 0;
329 out:
330 return err;
333 static const struct net_proto_family alg_family = {
334 .family = PF_ALG,
335 .create = alg_create,
336 .owner = THIS_MODULE,
339 int af_alg_make_sg(struct af_alg_sgl *sgl, void __user *addr, int len,
340 int write)
342 unsigned long from = (unsigned long)addr;
343 unsigned long npages;
344 unsigned off;
345 int err;
346 int i;
348 err = -EFAULT;
349 if (!access_ok(write ? VERIFY_READ : VERIFY_WRITE, addr, len))
350 goto out;
352 off = from & ~PAGE_MASK;
353 npages = (off + len + PAGE_SIZE - 1) >> PAGE_SHIFT;
354 if (npages > ALG_MAX_PAGES)
355 npages = ALG_MAX_PAGES;
357 err = get_user_pages_fast(from, npages, write, sgl->pages);
358 if (err < 0)
359 goto out;
361 npages = err;
362 err = -EINVAL;
363 if (WARN_ON(npages == 0))
364 goto out;
366 err = 0;
368 sg_init_table(sgl->sg, npages);
370 for (i = 0; i < npages; i++) {
371 int plen = min_t(int, len, PAGE_SIZE - off);
373 sg_set_page(sgl->sg + i, sgl->pages[i], plen, off);
375 off = 0;
376 len -= plen;
377 err += plen;
380 out:
381 return err;
383 EXPORT_SYMBOL_GPL(af_alg_make_sg);
385 void af_alg_free_sg(struct af_alg_sgl *sgl)
387 int i;
389 i = 0;
390 do {
391 put_page(sgl->pages[i]);
392 } while (!sg_is_last(sgl->sg + (i++)));
394 EXPORT_SYMBOL_GPL(af_alg_free_sg);
396 int af_alg_cmsg_send(struct msghdr *msg, struct af_alg_control *con)
398 struct cmsghdr *cmsg;
400 for (cmsg = CMSG_FIRSTHDR(msg); cmsg; cmsg = CMSG_NXTHDR(msg, cmsg)) {
401 if (!CMSG_OK(msg, cmsg))
402 return -EINVAL;
403 if (cmsg->cmsg_level != SOL_ALG)
404 continue;
406 switch(cmsg->cmsg_type) {
407 case ALG_SET_IV:
408 if (cmsg->cmsg_len < CMSG_LEN(sizeof(*con->iv)))
409 return -EINVAL;
410 con->iv = (void *)CMSG_DATA(cmsg);
411 if (cmsg->cmsg_len < CMSG_LEN(con->iv->ivlen +
412 sizeof(*con->iv)))
413 return -EINVAL;
414 break;
416 case ALG_SET_OP:
417 if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32)))
418 return -EINVAL;
419 con->op = *(u32 *)CMSG_DATA(cmsg);
420 break;
422 default:
423 return -EINVAL;
427 return 0;
429 EXPORT_SYMBOL_GPL(af_alg_cmsg_send);
431 int af_alg_wait_for_completion(int err, struct af_alg_completion *completion)
433 switch (err) {
434 case -EINPROGRESS:
435 case -EBUSY:
436 wait_for_completion(&completion->completion);
437 INIT_COMPLETION(completion->completion);
438 err = completion->err;
439 break;
442 return err;
444 EXPORT_SYMBOL_GPL(af_alg_wait_for_completion);
446 void af_alg_complete(struct crypto_async_request *req, int err)
448 struct af_alg_completion *completion = req->data;
450 completion->err = err;
451 complete(&completion->completion);
453 EXPORT_SYMBOL_GPL(af_alg_complete);
455 static int __init af_alg_init(void)
457 int err = proto_register(&alg_proto, 0);
459 if (err)
460 goto out;
462 err = sock_register(&alg_family);
463 if (err != 0)
464 goto out_unregister_proto;
466 out:
467 return err;
469 out_unregister_proto:
470 proto_unregister(&alg_proto);
471 goto out;
474 static void __exit af_alg_exit(void)
476 sock_unregister(PF_ALG);
477 proto_unregister(&alg_proto);
480 module_init(af_alg_init);
481 module_exit(af_alg_exit);
482 MODULE_LICENSE("GPL");
483 MODULE_ALIAS_NETPROTO(AF_ALG);