1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * Create default crypto algorithm instances. 4 * 5 * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au> 6 */ 7 8 #include <crypto/internal/aead.h> 9 #include <linux/completion.h> 10 #include <linux/ctype.h> 11 #include <linux/err.h> 12 #include <linux/init.h> 13 #include <linux/kthread.h> 14 #include <linux/module.h> 15 #include <linux/notifier.h> 16 #include <linux/rtnetlink.h> 17 #include <linux/sched/signal.h> 18 #include <linux/slab.h> 19 #include <linux/string.h> 20 21 #include "internal.h" 22 23 struct cryptomgr_param { 24 struct rtattr *tb[CRYPTO_MAX_ATTRS + 2]; 25 26 struct { 27 struct rtattr attr; 28 struct crypto_attr_type data; 29 } type; 30 31 union { 32 struct rtattr attr; 33 struct { 34 struct rtattr attr; 35 struct crypto_attr_alg data; 36 } alg; 37 struct { 38 struct rtattr attr; 39 struct crypto_attr_u32 data; 40 } nu32; 41 } attrs[CRYPTO_MAX_ATTRS]; 42 43 char template[CRYPTO_MAX_ALG_NAME]; 44 45 struct crypto_larval *larval; 46 47 u32 otype; 48 u32 omask; 49 }; 50 51 struct crypto_test_param { 52 char driver[CRYPTO_MAX_ALG_NAME]; 53 char alg[CRYPTO_MAX_ALG_NAME]; 54 u32 type; 55 }; 56 57 static int cryptomgr_probe(void *data) 58 { 59 struct cryptomgr_param *param = data; 60 struct crypto_template *tmpl; 61 struct crypto_instance *inst; 62 int err; 63 64 tmpl = crypto_lookup_template(param->template); 65 if (!tmpl) 66 goto out; 67 68 do { 69 if (tmpl->create) { 70 err = tmpl->create(tmpl, param->tb); 71 continue; 72 } 73 74 inst = tmpl->alloc(param->tb); 75 if (IS_ERR(inst)) 76 err = PTR_ERR(inst); 77 else if ((err = crypto_register_instance(tmpl, inst))) 78 tmpl->free(inst); 79 } while (err == -EAGAIN && !signal_pending(current)); 80 81 crypto_tmpl_put(tmpl); 82 83 out: 84 complete_all(¶m->larval->completion); 85 crypto_alg_put(¶m->larval->alg); 86 kfree(param); 87 module_put_and_exit(0); 88 } 89 90 static int cryptomgr_schedule_probe(struct crypto_larval *larval) 91 { 92 struct task_struct *thread; 93 struct cryptomgr_param *param; 94 const char *name = larval->alg.cra_name; 95 const char *p; 96 unsigned int len; 97 int i; 98 99 if (!try_module_get(THIS_MODULE)) 100 goto err; 101 102 param = kzalloc(sizeof(*param), GFP_KERNEL); 103 if (!param) 104 goto err_put_module; 105 106 for (p = name; isalnum(*p) || *p == '-' || *p == '_'; p++) 107 ; 108 109 len = p - name; 110 if (!len || *p != '(') 111 goto err_free_param; 112 113 memcpy(param->template, name, len); 114 115 i = 0; 116 for (;;) { 117 int notnum = 0; 118 119 name = ++p; 120 121 for (; isalnum(*p) || *p == '-' || *p == '_'; p++) 122 notnum |= !isdigit(*p); 123 124 if (*p == '(') { 125 int recursion = 0; 126 127 for (;;) { 128 if (!*++p) 129 goto err_free_param; 130 if (*p == '(') 131 recursion++; 132 else if (*p == ')' && !recursion--) 133 break; 134 } 135 136 notnum = 1; 137 p++; 138 } 139 140 len = p - name; 141 if (!len) 142 goto err_free_param; 143 144 if (notnum) { 145 param->attrs[i].alg.attr.rta_len = 146 sizeof(param->attrs[i].alg); 147 param->attrs[i].alg.attr.rta_type = CRYPTOA_ALG; 148 memcpy(param->attrs[i].alg.data.name, name, len); 149 } else { 150 param->attrs[i].nu32.attr.rta_len = 151 sizeof(param->attrs[i].nu32); 152 param->attrs[i].nu32.attr.rta_type = CRYPTOA_U32; 153 param->attrs[i].nu32.data.num = 154 simple_strtol(name, NULL, 0); 155 } 156 157 param->tb[i + 1] = ¶m->attrs[i].attr; 158 i++; 159 160 if (i >= CRYPTO_MAX_ATTRS) 161 goto err_free_param; 162 163 if (*p == ')') 164 break; 165 166 if (*p != ',') 167 goto err_free_param; 168 } 169 170 if (!i) 171 goto err_free_param; 172 173 param->tb[i + 1] = NULL; 174 175 param->type.attr.rta_len = sizeof(param->type); 176 param->type.attr.rta_type = CRYPTOA_TYPE; 177 param->type.data.type = larval->alg.cra_flags & ~CRYPTO_ALG_TESTED; 178 param->type.data.mask = larval->mask & ~CRYPTO_ALG_TESTED; 179 param->tb[0] = ¶m->type.attr; 180 181 param->otype = larval->alg.cra_flags; 182 param->omask = larval->mask; 183 184 crypto_alg_get(&larval->alg); 185 param->larval = larval; 186 187 thread = kthread_run(cryptomgr_probe, param, "cryptomgr_probe"); 188 if (IS_ERR(thread)) 189 goto err_put_larval; 190 191 wait_for_completion_interruptible(&larval->completion); 192 193 return NOTIFY_STOP; 194 195 err_put_larval: 196 crypto_alg_put(&larval->alg); 197 err_free_param: 198 kfree(param); 199 err_put_module: 200 module_put(THIS_MODULE); 201 err: 202 return NOTIFY_OK; 203 } 204 205 static int cryptomgr_test(void *data) 206 { 207 struct crypto_test_param *param = data; 208 u32 type = param->type; 209 int err = 0; 210 211 #ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS 212 goto skiptest; 213 #endif 214 215 if (type & CRYPTO_ALG_TESTED) 216 goto skiptest; 217 218 err = alg_test(param->driver, param->alg, type, CRYPTO_ALG_TESTED); 219 220 skiptest: 221 crypto_alg_tested(param->driver, err); 222 223 kfree(param); 224 module_put_and_exit(0); 225 } 226 227 static int cryptomgr_schedule_test(struct crypto_alg *alg) 228 { 229 struct task_struct *thread; 230 struct crypto_test_param *param; 231 u32 type; 232 233 if (!try_module_get(THIS_MODULE)) 234 goto err; 235 236 param = kzalloc(sizeof(*param), GFP_KERNEL); 237 if (!param) 238 goto err_put_module; 239 240 memcpy(param->driver, alg->cra_driver_name, sizeof(param->driver)); 241 memcpy(param->alg, alg->cra_name, sizeof(param->alg)); 242 type = alg->cra_flags; 243 244 /* Do not test internal algorithms. */ 245 if (type & CRYPTO_ALG_INTERNAL) 246 type |= CRYPTO_ALG_TESTED; 247 248 param->type = type; 249 250 thread = kthread_run(cryptomgr_test, param, "cryptomgr_test"); 251 if (IS_ERR(thread)) 252 goto err_free_param; 253 254 return NOTIFY_STOP; 255 256 err_free_param: 257 kfree(param); 258 err_put_module: 259 module_put(THIS_MODULE); 260 err: 261 return NOTIFY_OK; 262 } 263 264 static int cryptomgr_notify(struct notifier_block *this, unsigned long msg, 265 void *data) 266 { 267 switch (msg) { 268 case CRYPTO_MSG_ALG_REQUEST: 269 return cryptomgr_schedule_probe(data); 270 case CRYPTO_MSG_ALG_REGISTER: 271 return cryptomgr_schedule_test(data); 272 case CRYPTO_MSG_ALG_LOADED: 273 break; 274 } 275 276 return NOTIFY_DONE; 277 } 278 279 static struct notifier_block cryptomgr_notifier = { 280 .notifier_call = cryptomgr_notify, 281 }; 282 283 static int __init cryptomgr_init(void) 284 { 285 return crypto_register_notifier(&cryptomgr_notifier); 286 } 287 288 static void __exit cryptomgr_exit(void) 289 { 290 int err = crypto_unregister_notifier(&cryptomgr_notifier); 291 BUG_ON(err); 292 } 293 294 /* 295 * This is arch_initcall() so that the crypto self-tests are run on algorithms 296 * registered early by subsys_initcall(). subsys_initcall() is needed for 297 * generic implementations so that they're available for comparison tests when 298 * other implementations are registered later by module_init(). 299 */ 300 arch_initcall(cryptomgr_init); 301 module_exit(cryptomgr_exit); 302 303 MODULE_LICENSE("GPL"); 304 MODULE_DESCRIPTION("Crypto Algorithm Manager"); 305