15068c7a8SSteffen Klassert /* 25068c7a8SSteffen Klassert * pcrypt - Parallel crypto wrapper. 35068c7a8SSteffen Klassert * 45068c7a8SSteffen Klassert * Copyright (C) 2009 secunet Security Networks AG 55068c7a8SSteffen Klassert * Copyright (C) 2009 Steffen Klassert <steffen.klassert@secunet.com> 65068c7a8SSteffen Klassert * 75068c7a8SSteffen Klassert * This program is free software; you can redistribute it and/or modify it 85068c7a8SSteffen Klassert * under the terms and conditions of the GNU General Public License, 95068c7a8SSteffen Klassert * version 2, as published by the Free Software Foundation. 105068c7a8SSteffen Klassert * 115068c7a8SSteffen Klassert * This program is distributed in the hope it will be useful, but WITHOUT 125068c7a8SSteffen Klassert * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 135068c7a8SSteffen Klassert * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for 145068c7a8SSteffen Klassert * more details. 155068c7a8SSteffen Klassert * 165068c7a8SSteffen Klassert * You should have received a copy of the GNU General Public License along with 175068c7a8SSteffen Klassert * this program; if not, write to the Free Software Foundation, Inc., 185068c7a8SSteffen Klassert * 51 Franklin St - Fifth Floor, Boston, MA 02110-1301 USA. 195068c7a8SSteffen Klassert */ 205068c7a8SSteffen Klassert 215068c7a8SSteffen Klassert #include <crypto/algapi.h> 225068c7a8SSteffen Klassert #include <crypto/internal/aead.h> 235068c7a8SSteffen Klassert #include <linux/err.h> 245068c7a8SSteffen Klassert #include <linux/init.h> 255068c7a8SSteffen Klassert #include <linux/module.h> 265068c7a8SSteffen Klassert #include <linux/slab.h> 27e15bacbeSDan Kruchinin #include <linux/notifier.h> 28a3fb1e33SDan Kruchinin #include <linux/kobject.h> 29d3f64e46SSteffen Klassert #include <linux/cpu.h> 305068c7a8SSteffen Klassert #include <crypto/pcrypt.h> 315068c7a8SSteffen Klassert 32c57e842eSSteffen Klassert struct padata_pcrypt { 33e15bacbeSDan Kruchinin struct padata_instance *pinst; 34e15bacbeSDan Kruchinin struct workqueue_struct *wq; 35e15bacbeSDan Kruchinin 36e15bacbeSDan Kruchinin /* 37e15bacbeSDan Kruchinin * Cpumask for callback CPUs. It should be 38e15bacbeSDan Kruchinin * equal to serial cpumask of corresponding padata instance, 39e15bacbeSDan Kruchinin * so it is updated when padata notifies us about serial 40e15bacbeSDan Kruchinin * cpumask change. 41e15bacbeSDan Kruchinin * 42e15bacbeSDan Kruchinin * cb_cpumask is protected by RCU. This fact prevents us from 43e15bacbeSDan Kruchinin * using cpumask_var_t directly because the actual type of 44e15bacbeSDan Kruchinin * cpumsak_var_t depends on kernel configuration(particularly on 45e15bacbeSDan Kruchinin * CONFIG_CPUMASK_OFFSTACK macro). Depending on the configuration 46e15bacbeSDan Kruchinin * cpumask_var_t may be either a pointer to the struct cpumask 47e15bacbeSDan Kruchinin * or a variable allocated on the stack. Thus we can not safely use 48e15bacbeSDan Kruchinin * cpumask_var_t with RCU operations such as rcu_assign_pointer or 49e15bacbeSDan Kruchinin * rcu_dereference. So cpumask_var_t is wrapped with struct 50e15bacbeSDan Kruchinin * pcrypt_cpumask which makes possible to use it with RCU. 51e15bacbeSDan Kruchinin */ 52e15bacbeSDan Kruchinin struct pcrypt_cpumask { 53e15bacbeSDan Kruchinin cpumask_var_t mask; 54e15bacbeSDan Kruchinin } *cb_cpumask; 55e15bacbeSDan Kruchinin struct notifier_block nblock; 56e15bacbeSDan Kruchinin }; 57e15bacbeSDan Kruchinin 58c57e842eSSteffen Klassert static struct padata_pcrypt pencrypt; 59c57e842eSSteffen Klassert static struct padata_pcrypt pdecrypt; 60a3fb1e33SDan Kruchinin static struct kset *pcrypt_kset; 615068c7a8SSteffen Klassert 625068c7a8SSteffen Klassert struct pcrypt_instance_ctx { 635068c7a8SSteffen Klassert struct crypto_spawn spawn; 645068c7a8SSteffen Klassert unsigned int tfm_count; 655068c7a8SSteffen Klassert }; 665068c7a8SSteffen Klassert 675068c7a8SSteffen Klassert struct pcrypt_aead_ctx { 685068c7a8SSteffen Klassert struct crypto_aead *child; 695068c7a8SSteffen Klassert unsigned int cb_cpu; 705068c7a8SSteffen Klassert }; 715068c7a8SSteffen Klassert 725068c7a8SSteffen Klassert static int pcrypt_do_parallel(struct padata_priv *padata, unsigned int *cb_cpu, 73c57e842eSSteffen Klassert struct padata_pcrypt *pcrypt) 745068c7a8SSteffen Klassert { 755068c7a8SSteffen Klassert unsigned int cpu_index, cpu, i; 76e15bacbeSDan Kruchinin struct pcrypt_cpumask *cpumask; 775068c7a8SSteffen Klassert 785068c7a8SSteffen Klassert cpu = *cb_cpu; 795068c7a8SSteffen Klassert 80e15bacbeSDan Kruchinin rcu_read_lock_bh(); 81*3110e400SMathias Krause cpumask = rcu_dereference_bh(pcrypt->cb_cpumask); 82e15bacbeSDan Kruchinin if (cpumask_test_cpu(cpu, cpumask->mask)) 835068c7a8SSteffen Klassert goto out; 845068c7a8SSteffen Klassert 85cc74f4bcSSteffen Klassert if (!cpumask_weight(cpumask->mask)) 86cc74f4bcSSteffen Klassert goto out; 87cc74f4bcSSteffen Klassert 88e15bacbeSDan Kruchinin cpu_index = cpu % cpumask_weight(cpumask->mask); 895068c7a8SSteffen Klassert 90e15bacbeSDan Kruchinin cpu = cpumask_first(cpumask->mask); 915068c7a8SSteffen Klassert for (i = 0; i < cpu_index; i++) 92e15bacbeSDan Kruchinin cpu = cpumask_next(cpu, cpumask->mask); 935068c7a8SSteffen Klassert 945068c7a8SSteffen Klassert *cb_cpu = cpu; 955068c7a8SSteffen Klassert 965068c7a8SSteffen Klassert out: 97e15bacbeSDan Kruchinin rcu_read_unlock_bh(); 98e15bacbeSDan Kruchinin return padata_do_parallel(pcrypt->pinst, padata, cpu); 995068c7a8SSteffen Klassert } 1005068c7a8SSteffen Klassert 1015068c7a8SSteffen Klassert static int pcrypt_aead_setkey(struct crypto_aead *parent, 1025068c7a8SSteffen Klassert const u8 *key, unsigned int keylen) 1035068c7a8SSteffen Klassert { 1045068c7a8SSteffen Klassert struct pcrypt_aead_ctx *ctx = crypto_aead_ctx(parent); 1055068c7a8SSteffen Klassert 1065068c7a8SSteffen Klassert return crypto_aead_setkey(ctx->child, key, keylen); 1075068c7a8SSteffen Klassert } 1085068c7a8SSteffen Klassert 1095068c7a8SSteffen Klassert static int pcrypt_aead_setauthsize(struct crypto_aead *parent, 1105068c7a8SSteffen Klassert unsigned int authsize) 1115068c7a8SSteffen Klassert { 1125068c7a8SSteffen Klassert struct pcrypt_aead_ctx *ctx = crypto_aead_ctx(parent); 1135068c7a8SSteffen Klassert 1145068c7a8SSteffen Klassert return crypto_aead_setauthsize(ctx->child, authsize); 1155068c7a8SSteffen Klassert } 1165068c7a8SSteffen Klassert 1175068c7a8SSteffen Klassert static void pcrypt_aead_serial(struct padata_priv *padata) 1185068c7a8SSteffen Klassert { 1195068c7a8SSteffen Klassert struct pcrypt_request *preq = pcrypt_padata_request(padata); 1205068c7a8SSteffen Klassert struct aead_request *req = pcrypt_request_ctx(preq); 1215068c7a8SSteffen Klassert 1225068c7a8SSteffen Klassert aead_request_complete(req->base.data, padata->info); 1235068c7a8SSteffen Klassert } 1245068c7a8SSteffen Klassert 1255068c7a8SSteffen Klassert static void pcrypt_aead_giv_serial(struct padata_priv *padata) 1265068c7a8SSteffen Klassert { 1275068c7a8SSteffen Klassert struct pcrypt_request *preq = pcrypt_padata_request(padata); 1285068c7a8SSteffen Klassert struct aead_givcrypt_request *req = pcrypt_request_ctx(preq); 1295068c7a8SSteffen Klassert 1305068c7a8SSteffen Klassert aead_request_complete(req->areq.base.data, padata->info); 1315068c7a8SSteffen Klassert } 1325068c7a8SSteffen Klassert 1335068c7a8SSteffen Klassert static void pcrypt_aead_done(struct crypto_async_request *areq, int err) 1345068c7a8SSteffen Klassert { 1355068c7a8SSteffen Klassert struct aead_request *req = areq->data; 1365068c7a8SSteffen Klassert struct pcrypt_request *preq = aead_request_ctx(req); 1375068c7a8SSteffen Klassert struct padata_priv *padata = pcrypt_request_padata(preq); 1385068c7a8SSteffen Klassert 1395068c7a8SSteffen Klassert padata->info = err; 1405068c7a8SSteffen Klassert req->base.flags &= ~CRYPTO_TFM_REQ_MAY_SLEEP; 1415068c7a8SSteffen Klassert 1425068c7a8SSteffen Klassert padata_do_serial(padata); 1435068c7a8SSteffen Klassert } 1445068c7a8SSteffen Klassert 1455068c7a8SSteffen Klassert static void pcrypt_aead_enc(struct padata_priv *padata) 1465068c7a8SSteffen Klassert { 1475068c7a8SSteffen Klassert struct pcrypt_request *preq = pcrypt_padata_request(padata); 1485068c7a8SSteffen Klassert struct aead_request *req = pcrypt_request_ctx(preq); 1495068c7a8SSteffen Klassert 1505068c7a8SSteffen Klassert padata->info = crypto_aead_encrypt(req); 1515068c7a8SSteffen Klassert 1525a1436beSSteffen Klassert if (padata->info == -EINPROGRESS) 1535068c7a8SSteffen Klassert return; 1545068c7a8SSteffen Klassert 1555068c7a8SSteffen Klassert padata_do_serial(padata); 1565068c7a8SSteffen Klassert } 1575068c7a8SSteffen Klassert 1585068c7a8SSteffen Klassert static int pcrypt_aead_encrypt(struct aead_request *req) 1595068c7a8SSteffen Klassert { 1605068c7a8SSteffen Klassert int err; 1615068c7a8SSteffen Klassert struct pcrypt_request *preq = aead_request_ctx(req); 1625068c7a8SSteffen Klassert struct aead_request *creq = pcrypt_request_ctx(preq); 1635068c7a8SSteffen Klassert struct padata_priv *padata = pcrypt_request_padata(preq); 1645068c7a8SSteffen Klassert struct crypto_aead *aead = crypto_aead_reqtfm(req); 1655068c7a8SSteffen Klassert struct pcrypt_aead_ctx *ctx = crypto_aead_ctx(aead); 1665068c7a8SSteffen Klassert u32 flags = aead_request_flags(req); 1675068c7a8SSteffen Klassert 1685068c7a8SSteffen Klassert memset(padata, 0, sizeof(struct padata_priv)); 1695068c7a8SSteffen Klassert 1705068c7a8SSteffen Klassert padata->parallel = pcrypt_aead_enc; 1715068c7a8SSteffen Klassert padata->serial = pcrypt_aead_serial; 1725068c7a8SSteffen Klassert 1735068c7a8SSteffen Klassert aead_request_set_tfm(creq, ctx->child); 1745068c7a8SSteffen Klassert aead_request_set_callback(creq, flags & ~CRYPTO_TFM_REQ_MAY_SLEEP, 1755068c7a8SSteffen Klassert pcrypt_aead_done, req); 1765068c7a8SSteffen Klassert aead_request_set_crypt(creq, req->src, req->dst, 1775068c7a8SSteffen Klassert req->cryptlen, req->iv); 1785068c7a8SSteffen Klassert aead_request_set_assoc(creq, req->assoc, req->assoclen); 1795068c7a8SSteffen Klassert 180e15bacbeSDan Kruchinin err = pcrypt_do_parallel(padata, &ctx->cb_cpu, &pencrypt); 18183f619f3SSteffen Klassert if (!err) 18283f619f3SSteffen Klassert return -EINPROGRESS; 1835068c7a8SSteffen Klassert 1845068c7a8SSteffen Klassert return err; 1855068c7a8SSteffen Klassert } 1865068c7a8SSteffen Klassert 1875068c7a8SSteffen Klassert static void pcrypt_aead_dec(struct padata_priv *padata) 1885068c7a8SSteffen Klassert { 1895068c7a8SSteffen Klassert struct pcrypt_request *preq = pcrypt_padata_request(padata); 1905068c7a8SSteffen Klassert struct aead_request *req = pcrypt_request_ctx(preq); 1915068c7a8SSteffen Klassert 1925068c7a8SSteffen Klassert padata->info = crypto_aead_decrypt(req); 1935068c7a8SSteffen Klassert 1945a1436beSSteffen Klassert if (padata->info == -EINPROGRESS) 1955068c7a8SSteffen Klassert return; 1965068c7a8SSteffen Klassert 1975068c7a8SSteffen Klassert padata_do_serial(padata); 1985068c7a8SSteffen Klassert } 1995068c7a8SSteffen Klassert 2005068c7a8SSteffen Klassert static int pcrypt_aead_decrypt(struct aead_request *req) 2015068c7a8SSteffen Klassert { 2025068c7a8SSteffen Klassert int err; 2035068c7a8SSteffen Klassert struct pcrypt_request *preq = aead_request_ctx(req); 2045068c7a8SSteffen Klassert struct aead_request *creq = pcrypt_request_ctx(preq); 2055068c7a8SSteffen Klassert struct padata_priv *padata = pcrypt_request_padata(preq); 2065068c7a8SSteffen Klassert struct crypto_aead *aead = crypto_aead_reqtfm(req); 2075068c7a8SSteffen Klassert struct pcrypt_aead_ctx *ctx = crypto_aead_ctx(aead); 2085068c7a8SSteffen Klassert u32 flags = aead_request_flags(req); 2095068c7a8SSteffen Klassert 2105068c7a8SSteffen Klassert memset(padata, 0, sizeof(struct padata_priv)); 2115068c7a8SSteffen Klassert 2125068c7a8SSteffen Klassert padata->parallel = pcrypt_aead_dec; 2135068c7a8SSteffen Klassert padata->serial = pcrypt_aead_serial; 2145068c7a8SSteffen Klassert 2155068c7a8SSteffen Klassert aead_request_set_tfm(creq, ctx->child); 2165068c7a8SSteffen Klassert aead_request_set_callback(creq, flags & ~CRYPTO_TFM_REQ_MAY_SLEEP, 2175068c7a8SSteffen Klassert pcrypt_aead_done, req); 2185068c7a8SSteffen Klassert aead_request_set_crypt(creq, req->src, req->dst, 2195068c7a8SSteffen Klassert req->cryptlen, req->iv); 2205068c7a8SSteffen Klassert aead_request_set_assoc(creq, req->assoc, req->assoclen); 2215068c7a8SSteffen Klassert 222e15bacbeSDan Kruchinin err = pcrypt_do_parallel(padata, &ctx->cb_cpu, &pdecrypt); 22383f619f3SSteffen Klassert if (!err) 22483f619f3SSteffen Klassert return -EINPROGRESS; 2255068c7a8SSteffen Klassert 2265068c7a8SSteffen Klassert return err; 2275068c7a8SSteffen Klassert } 2285068c7a8SSteffen Klassert 2295068c7a8SSteffen Klassert static void pcrypt_aead_givenc(struct padata_priv *padata) 2305068c7a8SSteffen Klassert { 2315068c7a8SSteffen Klassert struct pcrypt_request *preq = pcrypt_padata_request(padata); 2325068c7a8SSteffen Klassert struct aead_givcrypt_request *req = pcrypt_request_ctx(preq); 2335068c7a8SSteffen Klassert 2345068c7a8SSteffen Klassert padata->info = crypto_aead_givencrypt(req); 2355068c7a8SSteffen Klassert 2365a1436beSSteffen Klassert if (padata->info == -EINPROGRESS) 2375068c7a8SSteffen Klassert return; 2385068c7a8SSteffen Klassert 2395068c7a8SSteffen Klassert padata_do_serial(padata); 2405068c7a8SSteffen Klassert } 2415068c7a8SSteffen Klassert 2425068c7a8SSteffen Klassert static int pcrypt_aead_givencrypt(struct aead_givcrypt_request *req) 2435068c7a8SSteffen Klassert { 2445068c7a8SSteffen Klassert int err; 2455068c7a8SSteffen Klassert struct aead_request *areq = &req->areq; 2465068c7a8SSteffen Klassert struct pcrypt_request *preq = aead_request_ctx(areq); 2475068c7a8SSteffen Klassert struct aead_givcrypt_request *creq = pcrypt_request_ctx(preq); 2485068c7a8SSteffen Klassert struct padata_priv *padata = pcrypt_request_padata(preq); 2495068c7a8SSteffen Klassert struct crypto_aead *aead = aead_givcrypt_reqtfm(req); 2505068c7a8SSteffen Klassert struct pcrypt_aead_ctx *ctx = crypto_aead_ctx(aead); 2515068c7a8SSteffen Klassert u32 flags = aead_request_flags(areq); 2525068c7a8SSteffen Klassert 2535068c7a8SSteffen Klassert memset(padata, 0, sizeof(struct padata_priv)); 2545068c7a8SSteffen Klassert 2555068c7a8SSteffen Klassert padata->parallel = pcrypt_aead_givenc; 2565068c7a8SSteffen Klassert padata->serial = pcrypt_aead_giv_serial; 2575068c7a8SSteffen Klassert 2585068c7a8SSteffen Klassert aead_givcrypt_set_tfm(creq, ctx->child); 2595068c7a8SSteffen Klassert aead_givcrypt_set_callback(creq, flags & ~CRYPTO_TFM_REQ_MAY_SLEEP, 2605068c7a8SSteffen Klassert pcrypt_aead_done, areq); 2615068c7a8SSteffen Klassert aead_givcrypt_set_crypt(creq, areq->src, areq->dst, 2625068c7a8SSteffen Klassert areq->cryptlen, areq->iv); 2635068c7a8SSteffen Klassert aead_givcrypt_set_assoc(creq, areq->assoc, areq->assoclen); 2645068c7a8SSteffen Klassert aead_givcrypt_set_giv(creq, req->giv, req->seq); 2655068c7a8SSteffen Klassert 266e15bacbeSDan Kruchinin err = pcrypt_do_parallel(padata, &ctx->cb_cpu, &pencrypt); 26783f619f3SSteffen Klassert if (!err) 26883f619f3SSteffen Klassert return -EINPROGRESS; 2695068c7a8SSteffen Klassert 2705068c7a8SSteffen Klassert return err; 2715068c7a8SSteffen Klassert } 2725068c7a8SSteffen Klassert 2735068c7a8SSteffen Klassert static int pcrypt_aead_init_tfm(struct crypto_tfm *tfm) 2745068c7a8SSteffen Klassert { 2755068c7a8SSteffen Klassert int cpu, cpu_index; 2765068c7a8SSteffen Klassert struct crypto_instance *inst = crypto_tfm_alg_instance(tfm); 2775068c7a8SSteffen Klassert struct pcrypt_instance_ctx *ictx = crypto_instance_ctx(inst); 2785068c7a8SSteffen Klassert struct pcrypt_aead_ctx *ctx = crypto_tfm_ctx(tfm); 2795068c7a8SSteffen Klassert struct crypto_aead *cipher; 2805068c7a8SSteffen Klassert 2815068c7a8SSteffen Klassert ictx->tfm_count++; 2825068c7a8SSteffen Klassert 283fbf0ca1bSSteffen Klassert cpu_index = ictx->tfm_count % cpumask_weight(cpu_online_mask); 2845068c7a8SSteffen Klassert 285fbf0ca1bSSteffen Klassert ctx->cb_cpu = cpumask_first(cpu_online_mask); 2865068c7a8SSteffen Klassert for (cpu = 0; cpu < cpu_index; cpu++) 287fbf0ca1bSSteffen Klassert ctx->cb_cpu = cpumask_next(ctx->cb_cpu, cpu_online_mask); 2885068c7a8SSteffen Klassert 2895068c7a8SSteffen Klassert cipher = crypto_spawn_aead(crypto_instance_ctx(inst)); 2905068c7a8SSteffen Klassert 2915068c7a8SSteffen Klassert if (IS_ERR(cipher)) 2925068c7a8SSteffen Klassert return PTR_ERR(cipher); 2935068c7a8SSteffen Klassert 2945068c7a8SSteffen Klassert ctx->child = cipher; 2955068c7a8SSteffen Klassert tfm->crt_aead.reqsize = sizeof(struct pcrypt_request) 2965068c7a8SSteffen Klassert + sizeof(struct aead_givcrypt_request) 2975068c7a8SSteffen Klassert + crypto_aead_reqsize(cipher); 2985068c7a8SSteffen Klassert 2995068c7a8SSteffen Klassert return 0; 3005068c7a8SSteffen Klassert } 3015068c7a8SSteffen Klassert 3025068c7a8SSteffen Klassert static void pcrypt_aead_exit_tfm(struct crypto_tfm *tfm) 3035068c7a8SSteffen Klassert { 3045068c7a8SSteffen Klassert struct pcrypt_aead_ctx *ctx = crypto_tfm_ctx(tfm); 3055068c7a8SSteffen Klassert 3065068c7a8SSteffen Klassert crypto_free_aead(ctx->child); 3075068c7a8SSteffen Klassert } 3085068c7a8SSteffen Klassert 3095068c7a8SSteffen Klassert static struct crypto_instance *pcrypt_alloc_instance(struct crypto_alg *alg) 3105068c7a8SSteffen Klassert { 3115068c7a8SSteffen Klassert struct crypto_instance *inst; 3125068c7a8SSteffen Klassert struct pcrypt_instance_ctx *ctx; 3135068c7a8SSteffen Klassert int err; 3145068c7a8SSteffen Klassert 3155068c7a8SSteffen Klassert inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL); 3165068c7a8SSteffen Klassert if (!inst) { 3175068c7a8SSteffen Klassert inst = ERR_PTR(-ENOMEM); 3185068c7a8SSteffen Klassert goto out; 3195068c7a8SSteffen Klassert } 3205068c7a8SSteffen Klassert 3215068c7a8SSteffen Klassert err = -ENAMETOOLONG; 3225068c7a8SSteffen Klassert if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME, 3235068c7a8SSteffen Klassert "pcrypt(%s)", alg->cra_driver_name) >= CRYPTO_MAX_ALG_NAME) 3245068c7a8SSteffen Klassert goto out_free_inst; 3255068c7a8SSteffen Klassert 3265068c7a8SSteffen Klassert memcpy(inst->alg.cra_name, alg->cra_name, CRYPTO_MAX_ALG_NAME); 3275068c7a8SSteffen Klassert 3285068c7a8SSteffen Klassert ctx = crypto_instance_ctx(inst); 3295068c7a8SSteffen Klassert err = crypto_init_spawn(&ctx->spawn, alg, inst, 3305068c7a8SSteffen Klassert CRYPTO_ALG_TYPE_MASK); 3315068c7a8SSteffen Klassert if (err) 3325068c7a8SSteffen Klassert goto out_free_inst; 3335068c7a8SSteffen Klassert 3345068c7a8SSteffen Klassert inst->alg.cra_priority = alg->cra_priority + 100; 3355068c7a8SSteffen Klassert inst->alg.cra_blocksize = alg->cra_blocksize; 3365068c7a8SSteffen Klassert inst->alg.cra_alignmask = alg->cra_alignmask; 3375068c7a8SSteffen Klassert 3385068c7a8SSteffen Klassert out: 3395068c7a8SSteffen Klassert return inst; 3405068c7a8SSteffen Klassert 3415068c7a8SSteffen Klassert out_free_inst: 3425068c7a8SSteffen Klassert kfree(inst); 3435068c7a8SSteffen Klassert inst = ERR_PTR(err); 3445068c7a8SSteffen Klassert goto out; 3455068c7a8SSteffen Klassert } 3465068c7a8SSteffen Klassert 34780a6d7dbSDan Carpenter static struct crypto_instance *pcrypt_alloc_aead(struct rtattr **tb, 34880a6d7dbSDan Carpenter u32 type, u32 mask) 3495068c7a8SSteffen Klassert { 3505068c7a8SSteffen Klassert struct crypto_instance *inst; 3515068c7a8SSteffen Klassert struct crypto_alg *alg; 3525068c7a8SSteffen Klassert 35380a6d7dbSDan Carpenter alg = crypto_get_attr_alg(tb, type, (mask & CRYPTO_ALG_TYPE_MASK)); 3545068c7a8SSteffen Klassert if (IS_ERR(alg)) 3555068c7a8SSteffen Klassert return ERR_CAST(alg); 3565068c7a8SSteffen Klassert 3575068c7a8SSteffen Klassert inst = pcrypt_alloc_instance(alg); 3585068c7a8SSteffen Klassert if (IS_ERR(inst)) 3595068c7a8SSteffen Klassert goto out_put_alg; 3605068c7a8SSteffen Klassert 3615068c7a8SSteffen Klassert inst->alg.cra_flags = CRYPTO_ALG_TYPE_AEAD | CRYPTO_ALG_ASYNC; 3625068c7a8SSteffen Klassert inst->alg.cra_type = &crypto_aead_type; 3635068c7a8SSteffen Klassert 3645068c7a8SSteffen Klassert inst->alg.cra_aead.ivsize = alg->cra_aead.ivsize; 3655068c7a8SSteffen Klassert inst->alg.cra_aead.geniv = alg->cra_aead.geniv; 3665068c7a8SSteffen Klassert inst->alg.cra_aead.maxauthsize = alg->cra_aead.maxauthsize; 3675068c7a8SSteffen Klassert 3685068c7a8SSteffen Klassert inst->alg.cra_ctxsize = sizeof(struct pcrypt_aead_ctx); 3695068c7a8SSteffen Klassert 3705068c7a8SSteffen Klassert inst->alg.cra_init = pcrypt_aead_init_tfm; 3715068c7a8SSteffen Klassert inst->alg.cra_exit = pcrypt_aead_exit_tfm; 3725068c7a8SSteffen Klassert 3735068c7a8SSteffen Klassert inst->alg.cra_aead.setkey = pcrypt_aead_setkey; 3745068c7a8SSteffen Klassert inst->alg.cra_aead.setauthsize = pcrypt_aead_setauthsize; 3755068c7a8SSteffen Klassert inst->alg.cra_aead.encrypt = pcrypt_aead_encrypt; 3765068c7a8SSteffen Klassert inst->alg.cra_aead.decrypt = pcrypt_aead_decrypt; 3775068c7a8SSteffen Klassert inst->alg.cra_aead.givencrypt = pcrypt_aead_givencrypt; 3785068c7a8SSteffen Klassert 3795068c7a8SSteffen Klassert out_put_alg: 3805068c7a8SSteffen Klassert crypto_mod_put(alg); 3815068c7a8SSteffen Klassert return inst; 3825068c7a8SSteffen Klassert } 3835068c7a8SSteffen Klassert 3845068c7a8SSteffen Klassert static struct crypto_instance *pcrypt_alloc(struct rtattr **tb) 3855068c7a8SSteffen Klassert { 3865068c7a8SSteffen Klassert struct crypto_attr_type *algt; 3875068c7a8SSteffen Klassert 3885068c7a8SSteffen Klassert algt = crypto_get_attr_type(tb); 3895068c7a8SSteffen Klassert if (IS_ERR(algt)) 3905068c7a8SSteffen Klassert return ERR_CAST(algt); 3915068c7a8SSteffen Klassert 3925068c7a8SSteffen Klassert switch (algt->type & algt->mask & CRYPTO_ALG_TYPE_MASK) { 3935068c7a8SSteffen Klassert case CRYPTO_ALG_TYPE_AEAD: 39480a6d7dbSDan Carpenter return pcrypt_alloc_aead(tb, algt->type, algt->mask); 3955068c7a8SSteffen Klassert } 3965068c7a8SSteffen Klassert 3975068c7a8SSteffen Klassert return ERR_PTR(-EINVAL); 3985068c7a8SSteffen Klassert } 3995068c7a8SSteffen Klassert 4005068c7a8SSteffen Klassert static void pcrypt_free(struct crypto_instance *inst) 4015068c7a8SSteffen Klassert { 4025068c7a8SSteffen Klassert struct pcrypt_instance_ctx *ctx = crypto_instance_ctx(inst); 4035068c7a8SSteffen Klassert 4045068c7a8SSteffen Klassert crypto_drop_spawn(&ctx->spawn); 4055068c7a8SSteffen Klassert kfree(inst); 4065068c7a8SSteffen Klassert } 4075068c7a8SSteffen Klassert 408e15bacbeSDan Kruchinin static int pcrypt_cpumask_change_notify(struct notifier_block *self, 409e15bacbeSDan Kruchinin unsigned long val, void *data) 410e15bacbeSDan Kruchinin { 411c57e842eSSteffen Klassert struct padata_pcrypt *pcrypt; 412e15bacbeSDan Kruchinin struct pcrypt_cpumask *new_mask, *old_mask; 413d3f64e46SSteffen Klassert struct padata_cpumask *cpumask = (struct padata_cpumask *)data; 414e15bacbeSDan Kruchinin 415e15bacbeSDan Kruchinin if (!(val & PADATA_CPU_SERIAL)) 416e15bacbeSDan Kruchinin return 0; 417e15bacbeSDan Kruchinin 418c57e842eSSteffen Klassert pcrypt = container_of(self, struct padata_pcrypt, nblock); 419e15bacbeSDan Kruchinin new_mask = kmalloc(sizeof(*new_mask), GFP_KERNEL); 420e15bacbeSDan Kruchinin if (!new_mask) 421e15bacbeSDan Kruchinin return -ENOMEM; 422e15bacbeSDan Kruchinin if (!alloc_cpumask_var(&new_mask->mask, GFP_KERNEL)) { 423e15bacbeSDan Kruchinin kfree(new_mask); 424e15bacbeSDan Kruchinin return -ENOMEM; 425e15bacbeSDan Kruchinin } 426e15bacbeSDan Kruchinin 427e15bacbeSDan Kruchinin old_mask = pcrypt->cb_cpumask; 428e15bacbeSDan Kruchinin 429d3f64e46SSteffen Klassert cpumask_copy(new_mask->mask, cpumask->cbcpu); 430e15bacbeSDan Kruchinin rcu_assign_pointer(pcrypt->cb_cpumask, new_mask); 431e15bacbeSDan Kruchinin synchronize_rcu_bh(); 432e15bacbeSDan Kruchinin 433e15bacbeSDan Kruchinin free_cpumask_var(old_mask->mask); 434e15bacbeSDan Kruchinin kfree(old_mask); 435e15bacbeSDan Kruchinin return 0; 436e15bacbeSDan Kruchinin } 437e15bacbeSDan Kruchinin 438a3fb1e33SDan Kruchinin static int pcrypt_sysfs_add(struct padata_instance *pinst, const char *name) 439a3fb1e33SDan Kruchinin { 440a3fb1e33SDan Kruchinin int ret; 441a3fb1e33SDan Kruchinin 442a3fb1e33SDan Kruchinin pinst->kobj.kset = pcrypt_kset; 443a3fb1e33SDan Kruchinin ret = kobject_add(&pinst->kobj, NULL, name); 444a3fb1e33SDan Kruchinin if (!ret) 445a3fb1e33SDan Kruchinin kobject_uevent(&pinst->kobj, KOBJ_ADD); 446a3fb1e33SDan Kruchinin 447a3fb1e33SDan Kruchinin return ret; 448a3fb1e33SDan Kruchinin } 449a3fb1e33SDan Kruchinin 450c57e842eSSteffen Klassert static int pcrypt_init_padata(struct padata_pcrypt *pcrypt, 451e15bacbeSDan Kruchinin const char *name) 452e15bacbeSDan Kruchinin { 453e15bacbeSDan Kruchinin int ret = -ENOMEM; 454e15bacbeSDan Kruchinin struct pcrypt_cpumask *mask; 455e15bacbeSDan Kruchinin 456d3f64e46SSteffen Klassert get_online_cpus(); 457d3f64e46SSteffen Klassert 458d8537548SKees Cook pcrypt->wq = alloc_workqueue("%s", WQ_MEM_RECLAIM | WQ_CPU_INTENSIVE, 459d8537548SKees Cook 1, name); 460e15bacbeSDan Kruchinin if (!pcrypt->wq) 461e15bacbeSDan Kruchinin goto err; 462e15bacbeSDan Kruchinin 463e6cc1170SSteffen Klassert pcrypt->pinst = padata_alloc_possible(pcrypt->wq); 464e15bacbeSDan Kruchinin if (!pcrypt->pinst) 465e15bacbeSDan Kruchinin goto err_destroy_workqueue; 466e15bacbeSDan Kruchinin 467e15bacbeSDan Kruchinin mask = kmalloc(sizeof(*mask), GFP_KERNEL); 468e15bacbeSDan Kruchinin if (!mask) 469e15bacbeSDan Kruchinin goto err_free_padata; 470e15bacbeSDan Kruchinin if (!alloc_cpumask_var(&mask->mask, GFP_KERNEL)) { 471e15bacbeSDan Kruchinin kfree(mask); 472e15bacbeSDan Kruchinin goto err_free_padata; 473e15bacbeSDan Kruchinin } 474e15bacbeSDan Kruchinin 475fbf0ca1bSSteffen Klassert cpumask_and(mask->mask, cpu_possible_mask, cpu_online_mask); 476e15bacbeSDan Kruchinin rcu_assign_pointer(pcrypt->cb_cpumask, mask); 477e15bacbeSDan Kruchinin 478e15bacbeSDan Kruchinin pcrypt->nblock.notifier_call = pcrypt_cpumask_change_notify; 479e15bacbeSDan Kruchinin ret = padata_register_cpumask_notifier(pcrypt->pinst, &pcrypt->nblock); 480e15bacbeSDan Kruchinin if (ret) 481e15bacbeSDan Kruchinin goto err_free_cpumask; 482e15bacbeSDan Kruchinin 483a3fb1e33SDan Kruchinin ret = pcrypt_sysfs_add(pcrypt->pinst, name); 484a3fb1e33SDan Kruchinin if (ret) 485a3fb1e33SDan Kruchinin goto err_unregister_notifier; 486a3fb1e33SDan Kruchinin 487d3f64e46SSteffen Klassert put_online_cpus(); 488d3f64e46SSteffen Klassert 489e15bacbeSDan Kruchinin return ret; 490d3f64e46SSteffen Klassert 491a3fb1e33SDan Kruchinin err_unregister_notifier: 492a3fb1e33SDan Kruchinin padata_unregister_cpumask_notifier(pcrypt->pinst, &pcrypt->nblock); 493e15bacbeSDan Kruchinin err_free_cpumask: 494e15bacbeSDan Kruchinin free_cpumask_var(mask->mask); 495e15bacbeSDan Kruchinin kfree(mask); 496e15bacbeSDan Kruchinin err_free_padata: 497e15bacbeSDan Kruchinin padata_free(pcrypt->pinst); 498e15bacbeSDan Kruchinin err_destroy_workqueue: 499e15bacbeSDan Kruchinin destroy_workqueue(pcrypt->wq); 500e15bacbeSDan Kruchinin err: 501d3f64e46SSteffen Klassert put_online_cpus(); 502d3f64e46SSteffen Klassert 503e15bacbeSDan Kruchinin return ret; 504e15bacbeSDan Kruchinin } 505e15bacbeSDan Kruchinin 506c57e842eSSteffen Klassert static void pcrypt_fini_padata(struct padata_pcrypt *pcrypt) 507e15bacbeSDan Kruchinin { 508e15bacbeSDan Kruchinin free_cpumask_var(pcrypt->cb_cpumask->mask); 509e15bacbeSDan Kruchinin kfree(pcrypt->cb_cpumask); 510e15bacbeSDan Kruchinin 511e15bacbeSDan Kruchinin padata_stop(pcrypt->pinst); 512e15bacbeSDan Kruchinin padata_unregister_cpumask_notifier(pcrypt->pinst, &pcrypt->nblock); 513e15bacbeSDan Kruchinin destroy_workqueue(pcrypt->wq); 514e15bacbeSDan Kruchinin padata_free(pcrypt->pinst); 515e15bacbeSDan Kruchinin } 516e15bacbeSDan Kruchinin 5175068c7a8SSteffen Klassert static struct crypto_template pcrypt_tmpl = { 5185068c7a8SSteffen Klassert .name = "pcrypt", 5195068c7a8SSteffen Klassert .alloc = pcrypt_alloc, 5205068c7a8SSteffen Klassert .free = pcrypt_free, 5215068c7a8SSteffen Klassert .module = THIS_MODULE, 5225068c7a8SSteffen Klassert }; 5235068c7a8SSteffen Klassert 5245068c7a8SSteffen Klassert static int __init pcrypt_init(void) 5255068c7a8SSteffen Klassert { 526a3fb1e33SDan Kruchinin int err = -ENOMEM; 527a3fb1e33SDan Kruchinin 528a3fb1e33SDan Kruchinin pcrypt_kset = kset_create_and_add("pcrypt", NULL, kernel_kobj); 529a3fb1e33SDan Kruchinin if (!pcrypt_kset) 530a3fb1e33SDan Kruchinin goto err; 531e15bacbeSDan Kruchinin 532c57e842eSSteffen Klassert err = pcrypt_init_padata(&pencrypt, "pencrypt"); 533e15bacbeSDan Kruchinin if (err) 534a3fb1e33SDan Kruchinin goto err_unreg_kset; 5355068c7a8SSteffen Klassert 536c57e842eSSteffen Klassert err = pcrypt_init_padata(&pdecrypt, "pdecrypt"); 5374c879170SSteffen Klassert if (err) 538e15bacbeSDan Kruchinin goto err_deinit_pencrypt; 5394c879170SSteffen Klassert 540e15bacbeSDan Kruchinin padata_start(pencrypt.pinst); 541e15bacbeSDan Kruchinin padata_start(pdecrypt.pinst); 5425068c7a8SSteffen Klassert 5435068c7a8SSteffen Klassert return crypto_register_template(&pcrypt_tmpl); 5445068c7a8SSteffen Klassert 545e15bacbeSDan Kruchinin err_deinit_pencrypt: 546c57e842eSSteffen Klassert pcrypt_fini_padata(&pencrypt); 547a3fb1e33SDan Kruchinin err_unreg_kset: 548a3fb1e33SDan Kruchinin kset_unregister(pcrypt_kset); 5495068c7a8SSteffen Klassert err: 5504c879170SSteffen Klassert return err; 5515068c7a8SSteffen Klassert } 5525068c7a8SSteffen Klassert 5535068c7a8SSteffen Klassert static void __exit pcrypt_exit(void) 5545068c7a8SSteffen Klassert { 555c57e842eSSteffen Klassert pcrypt_fini_padata(&pencrypt); 556c57e842eSSteffen Klassert pcrypt_fini_padata(&pdecrypt); 5575068c7a8SSteffen Klassert 558a3fb1e33SDan Kruchinin kset_unregister(pcrypt_kset); 5595068c7a8SSteffen Klassert crypto_unregister_template(&pcrypt_tmpl); 5605068c7a8SSteffen Klassert } 5615068c7a8SSteffen Klassert 5625068c7a8SSteffen Klassert module_init(pcrypt_init); 5635068c7a8SSteffen Klassert module_exit(pcrypt_exit); 5645068c7a8SSteffen Klassert 5655068c7a8SSteffen Klassert MODULE_LICENSE("GPL"); 5665068c7a8SSteffen Klassert MODULE_AUTHOR("Steffen Klassert <steffen.klassert@secunet.com>"); 5675068c7a8SSteffen Klassert MODULE_DESCRIPTION("Parallel crypto wrapper"); 568