xref: /linux/crypto/pcrypt.c (revision a3fb1e330dd21d96c2e07dda513ad7e9af8b6ccf)
15068c7a8SSteffen Klassert /*
25068c7a8SSteffen Klassert  * pcrypt - Parallel crypto wrapper.
35068c7a8SSteffen Klassert  *
45068c7a8SSteffen Klassert  * Copyright (C) 2009 secunet Security Networks AG
55068c7a8SSteffen Klassert  * Copyright (C) 2009 Steffen Klassert <steffen.klassert@secunet.com>
65068c7a8SSteffen Klassert  *
75068c7a8SSteffen Klassert  * This program is free software; you can redistribute it and/or modify it
85068c7a8SSteffen Klassert  * under the terms and conditions of the GNU General Public License,
95068c7a8SSteffen Klassert  * version 2, as published by the Free Software Foundation.
105068c7a8SSteffen Klassert  *
115068c7a8SSteffen Klassert  * This program is distributed in the hope it will be useful, but WITHOUT
125068c7a8SSteffen Klassert  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
135068c7a8SSteffen Klassert  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
145068c7a8SSteffen Klassert  * more details.
155068c7a8SSteffen Klassert  *
165068c7a8SSteffen Klassert  * You should have received a copy of the GNU General Public License along with
175068c7a8SSteffen Klassert  * this program; if not, write to the Free Software Foundation, Inc.,
185068c7a8SSteffen Klassert  * 51 Franklin St - Fifth Floor, Boston, MA 02110-1301 USA.
195068c7a8SSteffen Klassert  */
205068c7a8SSteffen Klassert 
215068c7a8SSteffen Klassert #include <crypto/algapi.h>
225068c7a8SSteffen Klassert #include <crypto/internal/aead.h>
235068c7a8SSteffen Klassert #include <linux/err.h>
245068c7a8SSteffen Klassert #include <linux/init.h>
255068c7a8SSteffen Klassert #include <linux/module.h>
265068c7a8SSteffen Klassert #include <linux/slab.h>
27e15bacbeSDan Kruchinin #include <linux/notifier.h>
28*a3fb1e33SDan Kruchinin #include <linux/kobject.h>
295068c7a8SSteffen Klassert #include <crypto/pcrypt.h>
305068c7a8SSteffen Klassert 
31e15bacbeSDan Kruchinin struct pcrypt_instance {
32*a3fb1e33SDan Kruchinin 	const char *name;
33e15bacbeSDan Kruchinin 	struct padata_instance *pinst;
34e15bacbeSDan Kruchinin 	struct workqueue_struct *wq;
35e15bacbeSDan Kruchinin 
36e15bacbeSDan Kruchinin 	/*
37e15bacbeSDan Kruchinin 	 * Cpumask for callback CPUs. It should be
38e15bacbeSDan Kruchinin 	 * equal to serial cpumask of corresponding padata instance,
39e15bacbeSDan Kruchinin 	 * so it is updated when padata notifies us about serial
40e15bacbeSDan Kruchinin 	 * cpumask change.
41e15bacbeSDan Kruchinin 	 *
42e15bacbeSDan Kruchinin 	 * cb_cpumask is protected by RCU. This fact prevents us from
43e15bacbeSDan Kruchinin 	 * using cpumask_var_t directly because the actual type of
44e15bacbeSDan Kruchinin 	 * cpumsak_var_t depends on kernel configuration(particularly on
45e15bacbeSDan Kruchinin 	 * CONFIG_CPUMASK_OFFSTACK macro). Depending on the configuration
46e15bacbeSDan Kruchinin 	 * cpumask_var_t may be either a pointer to the struct cpumask
47e15bacbeSDan Kruchinin 	 * or a variable allocated on the stack. Thus we can not safely use
48e15bacbeSDan Kruchinin 	 * cpumask_var_t with RCU operations such as rcu_assign_pointer or
49e15bacbeSDan Kruchinin 	 * rcu_dereference. So cpumask_var_t is wrapped with struct
50e15bacbeSDan Kruchinin 	 * pcrypt_cpumask which makes possible to use it with RCU.
51e15bacbeSDan Kruchinin 	 */
52e15bacbeSDan Kruchinin 	struct pcrypt_cpumask {
53e15bacbeSDan Kruchinin 		cpumask_var_t mask;
54e15bacbeSDan Kruchinin 	} *cb_cpumask;
55e15bacbeSDan Kruchinin 	struct notifier_block nblock;
56e15bacbeSDan Kruchinin };
57e15bacbeSDan Kruchinin 
58e15bacbeSDan Kruchinin static struct pcrypt_instance pencrypt;
59e15bacbeSDan Kruchinin static struct pcrypt_instance pdecrypt;
60*a3fb1e33SDan Kruchinin static struct kset           *pcrypt_kset;
615068c7a8SSteffen Klassert 
625068c7a8SSteffen Klassert struct pcrypt_instance_ctx {
635068c7a8SSteffen Klassert 	struct crypto_spawn spawn;
645068c7a8SSteffen Klassert 	unsigned int tfm_count;
655068c7a8SSteffen Klassert };
665068c7a8SSteffen Klassert 
675068c7a8SSteffen Klassert struct pcrypt_aead_ctx {
685068c7a8SSteffen Klassert 	struct crypto_aead *child;
695068c7a8SSteffen Klassert 	unsigned int cb_cpu;
705068c7a8SSteffen Klassert };
715068c7a8SSteffen Klassert 
725068c7a8SSteffen Klassert static int pcrypt_do_parallel(struct padata_priv *padata, unsigned int *cb_cpu,
73e15bacbeSDan Kruchinin 			      struct pcrypt_instance *pcrypt)
745068c7a8SSteffen Klassert {
755068c7a8SSteffen Klassert 	unsigned int cpu_index, cpu, i;
76e15bacbeSDan Kruchinin 	struct pcrypt_cpumask *cpumask;
775068c7a8SSteffen Klassert 
785068c7a8SSteffen Klassert 	cpu = *cb_cpu;
795068c7a8SSteffen Klassert 
80e15bacbeSDan Kruchinin 	rcu_read_lock_bh();
81e15bacbeSDan Kruchinin 	cpumask = rcu_dereference(pcrypt->cb_cpumask);
82e15bacbeSDan Kruchinin 	if (cpumask_test_cpu(cpu, cpumask->mask))
835068c7a8SSteffen Klassert 			goto out;
845068c7a8SSteffen Klassert 
85e15bacbeSDan Kruchinin 	cpu_index = cpu % cpumask_weight(cpumask->mask);
865068c7a8SSteffen Klassert 
87e15bacbeSDan Kruchinin 	cpu = cpumask_first(cpumask->mask);
885068c7a8SSteffen Klassert 	for (i = 0; i < cpu_index; i++)
89e15bacbeSDan Kruchinin 		cpu = cpumask_next(cpu, cpumask->mask);
905068c7a8SSteffen Klassert 
915068c7a8SSteffen Klassert 	*cb_cpu = cpu;
925068c7a8SSteffen Klassert 
935068c7a8SSteffen Klassert out:
94e15bacbeSDan Kruchinin 	rcu_read_unlock_bh();
95e15bacbeSDan Kruchinin 	return padata_do_parallel(pcrypt->pinst, padata, cpu);
965068c7a8SSteffen Klassert }
975068c7a8SSteffen Klassert 
985068c7a8SSteffen Klassert static int pcrypt_aead_setkey(struct crypto_aead *parent,
995068c7a8SSteffen Klassert 			      const u8 *key, unsigned int keylen)
1005068c7a8SSteffen Klassert {
1015068c7a8SSteffen Klassert 	struct pcrypt_aead_ctx *ctx = crypto_aead_ctx(parent);
1025068c7a8SSteffen Klassert 
1035068c7a8SSteffen Klassert 	return crypto_aead_setkey(ctx->child, key, keylen);
1045068c7a8SSteffen Klassert }
1055068c7a8SSteffen Klassert 
1065068c7a8SSteffen Klassert static int pcrypt_aead_setauthsize(struct crypto_aead *parent,
1075068c7a8SSteffen Klassert 				   unsigned int authsize)
1085068c7a8SSteffen Klassert {
1095068c7a8SSteffen Klassert 	struct pcrypt_aead_ctx *ctx = crypto_aead_ctx(parent);
1105068c7a8SSteffen Klassert 
1115068c7a8SSteffen Klassert 	return crypto_aead_setauthsize(ctx->child, authsize);
1125068c7a8SSteffen Klassert }
1135068c7a8SSteffen Klassert 
1145068c7a8SSteffen Klassert static void pcrypt_aead_serial(struct padata_priv *padata)
1155068c7a8SSteffen Klassert {
1165068c7a8SSteffen Klassert 	struct pcrypt_request *preq = pcrypt_padata_request(padata);
1175068c7a8SSteffen Klassert 	struct aead_request *req = pcrypt_request_ctx(preq);
1185068c7a8SSteffen Klassert 
1195068c7a8SSteffen Klassert 	aead_request_complete(req->base.data, padata->info);
1205068c7a8SSteffen Klassert }
1215068c7a8SSteffen Klassert 
1225068c7a8SSteffen Klassert static void pcrypt_aead_giv_serial(struct padata_priv *padata)
1235068c7a8SSteffen Klassert {
1245068c7a8SSteffen Klassert 	struct pcrypt_request *preq = pcrypt_padata_request(padata);
1255068c7a8SSteffen Klassert 	struct aead_givcrypt_request *req = pcrypt_request_ctx(preq);
1265068c7a8SSteffen Klassert 
1275068c7a8SSteffen Klassert 	aead_request_complete(req->areq.base.data, padata->info);
1285068c7a8SSteffen Klassert }
1295068c7a8SSteffen Klassert 
1305068c7a8SSteffen Klassert static void pcrypt_aead_done(struct crypto_async_request *areq, int err)
1315068c7a8SSteffen Klassert {
1325068c7a8SSteffen Klassert 	struct aead_request *req = areq->data;
1335068c7a8SSteffen Klassert 	struct pcrypt_request *preq = aead_request_ctx(req);
1345068c7a8SSteffen Klassert 	struct padata_priv *padata = pcrypt_request_padata(preq);
1355068c7a8SSteffen Klassert 
1365068c7a8SSteffen Klassert 	padata->info = err;
1375068c7a8SSteffen Klassert 	req->base.flags &= ~CRYPTO_TFM_REQ_MAY_SLEEP;
1385068c7a8SSteffen Klassert 
1395068c7a8SSteffen Klassert 	padata_do_serial(padata);
1405068c7a8SSteffen Klassert }
1415068c7a8SSteffen Klassert 
1425068c7a8SSteffen Klassert static void pcrypt_aead_enc(struct padata_priv *padata)
1435068c7a8SSteffen Klassert {
1445068c7a8SSteffen Klassert 	struct pcrypt_request *preq = pcrypt_padata_request(padata);
1455068c7a8SSteffen Klassert 	struct aead_request *req = pcrypt_request_ctx(preq);
1465068c7a8SSteffen Klassert 
1475068c7a8SSteffen Klassert 	padata->info = crypto_aead_encrypt(req);
1485068c7a8SSteffen Klassert 
1495a1436beSSteffen Klassert 	if (padata->info == -EINPROGRESS)
1505068c7a8SSteffen Klassert 		return;
1515068c7a8SSteffen Klassert 
1525068c7a8SSteffen Klassert 	padata_do_serial(padata);
1535068c7a8SSteffen Klassert }
1545068c7a8SSteffen Klassert 
1555068c7a8SSteffen Klassert static int pcrypt_aead_encrypt(struct aead_request *req)
1565068c7a8SSteffen Klassert {
1575068c7a8SSteffen Klassert 	int err;
1585068c7a8SSteffen Klassert 	struct pcrypt_request *preq = aead_request_ctx(req);
1595068c7a8SSteffen Klassert 	struct aead_request *creq = pcrypt_request_ctx(preq);
1605068c7a8SSteffen Klassert 	struct padata_priv *padata = pcrypt_request_padata(preq);
1615068c7a8SSteffen Klassert 	struct crypto_aead *aead = crypto_aead_reqtfm(req);
1625068c7a8SSteffen Klassert 	struct pcrypt_aead_ctx *ctx = crypto_aead_ctx(aead);
1635068c7a8SSteffen Klassert 	u32 flags = aead_request_flags(req);
1645068c7a8SSteffen Klassert 
1655068c7a8SSteffen Klassert 	memset(padata, 0, sizeof(struct padata_priv));
1665068c7a8SSteffen Klassert 
1675068c7a8SSteffen Klassert 	padata->parallel = pcrypt_aead_enc;
1685068c7a8SSteffen Klassert 	padata->serial = pcrypt_aead_serial;
1695068c7a8SSteffen Klassert 
1705068c7a8SSteffen Klassert 	aead_request_set_tfm(creq, ctx->child);
1715068c7a8SSteffen Klassert 	aead_request_set_callback(creq, flags & ~CRYPTO_TFM_REQ_MAY_SLEEP,
1725068c7a8SSteffen Klassert 				  pcrypt_aead_done, req);
1735068c7a8SSteffen Klassert 	aead_request_set_crypt(creq, req->src, req->dst,
1745068c7a8SSteffen Klassert 			       req->cryptlen, req->iv);
1755068c7a8SSteffen Klassert 	aead_request_set_assoc(creq, req->assoc, req->assoclen);
1765068c7a8SSteffen Klassert 
177e15bacbeSDan Kruchinin 	err = pcrypt_do_parallel(padata, &ctx->cb_cpu, &pencrypt);
17883f619f3SSteffen Klassert 	if (!err)
17983f619f3SSteffen Klassert 		return -EINPROGRESS;
1805068c7a8SSteffen Klassert 
1815068c7a8SSteffen Klassert 	return err;
1825068c7a8SSteffen Klassert }
1835068c7a8SSteffen Klassert 
1845068c7a8SSteffen Klassert static void pcrypt_aead_dec(struct padata_priv *padata)
1855068c7a8SSteffen Klassert {
1865068c7a8SSteffen Klassert 	struct pcrypt_request *preq = pcrypt_padata_request(padata);
1875068c7a8SSteffen Klassert 	struct aead_request *req = pcrypt_request_ctx(preq);
1885068c7a8SSteffen Klassert 
1895068c7a8SSteffen Klassert 	padata->info = crypto_aead_decrypt(req);
1905068c7a8SSteffen Klassert 
1915a1436beSSteffen Klassert 	if (padata->info == -EINPROGRESS)
1925068c7a8SSteffen Klassert 		return;
1935068c7a8SSteffen Klassert 
1945068c7a8SSteffen Klassert 	padata_do_serial(padata);
1955068c7a8SSteffen Klassert }
1965068c7a8SSteffen Klassert 
1975068c7a8SSteffen Klassert static int pcrypt_aead_decrypt(struct aead_request *req)
1985068c7a8SSteffen Klassert {
1995068c7a8SSteffen Klassert 	int err;
2005068c7a8SSteffen Klassert 	struct pcrypt_request *preq = aead_request_ctx(req);
2015068c7a8SSteffen Klassert 	struct aead_request *creq = pcrypt_request_ctx(preq);
2025068c7a8SSteffen Klassert 	struct padata_priv *padata = pcrypt_request_padata(preq);
2035068c7a8SSteffen Klassert 	struct crypto_aead *aead = crypto_aead_reqtfm(req);
2045068c7a8SSteffen Klassert 	struct pcrypt_aead_ctx *ctx = crypto_aead_ctx(aead);
2055068c7a8SSteffen Klassert 	u32 flags = aead_request_flags(req);
2065068c7a8SSteffen Klassert 
2075068c7a8SSteffen Klassert 	memset(padata, 0, sizeof(struct padata_priv));
2085068c7a8SSteffen Klassert 
2095068c7a8SSteffen Klassert 	padata->parallel = pcrypt_aead_dec;
2105068c7a8SSteffen Klassert 	padata->serial = pcrypt_aead_serial;
2115068c7a8SSteffen Klassert 
2125068c7a8SSteffen Klassert 	aead_request_set_tfm(creq, ctx->child);
2135068c7a8SSteffen Klassert 	aead_request_set_callback(creq, flags & ~CRYPTO_TFM_REQ_MAY_SLEEP,
2145068c7a8SSteffen Klassert 				  pcrypt_aead_done, req);
2155068c7a8SSteffen Klassert 	aead_request_set_crypt(creq, req->src, req->dst,
2165068c7a8SSteffen Klassert 			       req->cryptlen, req->iv);
2175068c7a8SSteffen Klassert 	aead_request_set_assoc(creq, req->assoc, req->assoclen);
2185068c7a8SSteffen Klassert 
219e15bacbeSDan Kruchinin 	err = pcrypt_do_parallel(padata, &ctx->cb_cpu, &pdecrypt);
22083f619f3SSteffen Klassert 	if (!err)
22183f619f3SSteffen Klassert 		return -EINPROGRESS;
2225068c7a8SSteffen Klassert 
2235068c7a8SSteffen Klassert 	return err;
2245068c7a8SSteffen Klassert }
2255068c7a8SSteffen Klassert 
2265068c7a8SSteffen Klassert static void pcrypt_aead_givenc(struct padata_priv *padata)
2275068c7a8SSteffen Klassert {
2285068c7a8SSteffen Klassert 	struct pcrypt_request *preq = pcrypt_padata_request(padata);
2295068c7a8SSteffen Klassert 	struct aead_givcrypt_request *req = pcrypt_request_ctx(preq);
2305068c7a8SSteffen Klassert 
2315068c7a8SSteffen Klassert 	padata->info = crypto_aead_givencrypt(req);
2325068c7a8SSteffen Klassert 
2335a1436beSSteffen Klassert 	if (padata->info == -EINPROGRESS)
2345068c7a8SSteffen Klassert 		return;
2355068c7a8SSteffen Klassert 
2365068c7a8SSteffen Klassert 	padata_do_serial(padata);
2375068c7a8SSteffen Klassert }
2385068c7a8SSteffen Klassert 
2395068c7a8SSteffen Klassert static int pcrypt_aead_givencrypt(struct aead_givcrypt_request *req)
2405068c7a8SSteffen Klassert {
2415068c7a8SSteffen Klassert 	int err;
2425068c7a8SSteffen Klassert 	struct aead_request *areq = &req->areq;
2435068c7a8SSteffen Klassert 	struct pcrypt_request *preq = aead_request_ctx(areq);
2445068c7a8SSteffen Klassert 	struct aead_givcrypt_request *creq = pcrypt_request_ctx(preq);
2455068c7a8SSteffen Klassert 	struct padata_priv *padata = pcrypt_request_padata(preq);
2465068c7a8SSteffen Klassert 	struct crypto_aead *aead = aead_givcrypt_reqtfm(req);
2475068c7a8SSteffen Klassert 	struct pcrypt_aead_ctx *ctx = crypto_aead_ctx(aead);
2485068c7a8SSteffen Klassert 	u32 flags = aead_request_flags(areq);
2495068c7a8SSteffen Klassert 
2505068c7a8SSteffen Klassert 	memset(padata, 0, sizeof(struct padata_priv));
2515068c7a8SSteffen Klassert 
2525068c7a8SSteffen Klassert 	padata->parallel = pcrypt_aead_givenc;
2535068c7a8SSteffen Klassert 	padata->serial = pcrypt_aead_giv_serial;
2545068c7a8SSteffen Klassert 
2555068c7a8SSteffen Klassert 	aead_givcrypt_set_tfm(creq, ctx->child);
2565068c7a8SSteffen Klassert 	aead_givcrypt_set_callback(creq, flags & ~CRYPTO_TFM_REQ_MAY_SLEEP,
2575068c7a8SSteffen Klassert 				   pcrypt_aead_done, areq);
2585068c7a8SSteffen Klassert 	aead_givcrypt_set_crypt(creq, areq->src, areq->dst,
2595068c7a8SSteffen Klassert 				areq->cryptlen, areq->iv);
2605068c7a8SSteffen Klassert 	aead_givcrypt_set_assoc(creq, areq->assoc, areq->assoclen);
2615068c7a8SSteffen Klassert 	aead_givcrypt_set_giv(creq, req->giv, req->seq);
2625068c7a8SSteffen Klassert 
263e15bacbeSDan Kruchinin 	err = pcrypt_do_parallel(padata, &ctx->cb_cpu, &pencrypt);
26483f619f3SSteffen Klassert 	if (!err)
26583f619f3SSteffen Klassert 		return -EINPROGRESS;
2665068c7a8SSteffen Klassert 
2675068c7a8SSteffen Klassert 	return err;
2685068c7a8SSteffen Klassert }
2695068c7a8SSteffen Klassert 
2705068c7a8SSteffen Klassert static int pcrypt_aead_init_tfm(struct crypto_tfm *tfm)
2715068c7a8SSteffen Klassert {
2725068c7a8SSteffen Klassert 	int cpu, cpu_index;
2735068c7a8SSteffen Klassert 	struct crypto_instance *inst = crypto_tfm_alg_instance(tfm);
2745068c7a8SSteffen Klassert 	struct pcrypt_instance_ctx *ictx = crypto_instance_ctx(inst);
2755068c7a8SSteffen Klassert 	struct pcrypt_aead_ctx *ctx = crypto_tfm_ctx(tfm);
2765068c7a8SSteffen Klassert 	struct crypto_aead *cipher;
2775068c7a8SSteffen Klassert 
2785068c7a8SSteffen Klassert 	ictx->tfm_count++;
2795068c7a8SSteffen Klassert 
2805068c7a8SSteffen Klassert 	cpu_index = ictx->tfm_count % cpumask_weight(cpu_active_mask);
2815068c7a8SSteffen Klassert 
2825068c7a8SSteffen Klassert 	ctx->cb_cpu = cpumask_first(cpu_active_mask);
2835068c7a8SSteffen Klassert 	for (cpu = 0; cpu < cpu_index; cpu++)
2845068c7a8SSteffen Klassert 		ctx->cb_cpu = cpumask_next(ctx->cb_cpu, cpu_active_mask);
2855068c7a8SSteffen Klassert 
2865068c7a8SSteffen Klassert 	cipher = crypto_spawn_aead(crypto_instance_ctx(inst));
2875068c7a8SSteffen Klassert 
2885068c7a8SSteffen Klassert 	if (IS_ERR(cipher))
2895068c7a8SSteffen Klassert 		return PTR_ERR(cipher);
2905068c7a8SSteffen Klassert 
2915068c7a8SSteffen Klassert 	ctx->child = cipher;
2925068c7a8SSteffen Klassert 	tfm->crt_aead.reqsize = sizeof(struct pcrypt_request)
2935068c7a8SSteffen Klassert 		+ sizeof(struct aead_givcrypt_request)
2945068c7a8SSteffen Klassert 		+ crypto_aead_reqsize(cipher);
2955068c7a8SSteffen Klassert 
2965068c7a8SSteffen Klassert 	return 0;
2975068c7a8SSteffen Klassert }
2985068c7a8SSteffen Klassert 
2995068c7a8SSteffen Klassert static void pcrypt_aead_exit_tfm(struct crypto_tfm *tfm)
3005068c7a8SSteffen Klassert {
3015068c7a8SSteffen Klassert 	struct pcrypt_aead_ctx *ctx = crypto_tfm_ctx(tfm);
3025068c7a8SSteffen Klassert 
3035068c7a8SSteffen Klassert 	crypto_free_aead(ctx->child);
3045068c7a8SSteffen Klassert }
3055068c7a8SSteffen Klassert 
3065068c7a8SSteffen Klassert static struct crypto_instance *pcrypt_alloc_instance(struct crypto_alg *alg)
3075068c7a8SSteffen Klassert {
3085068c7a8SSteffen Klassert 	struct crypto_instance *inst;
3095068c7a8SSteffen Klassert 	struct pcrypt_instance_ctx *ctx;
3105068c7a8SSteffen Klassert 	int err;
3115068c7a8SSteffen Klassert 
3125068c7a8SSteffen Klassert 	inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL);
3135068c7a8SSteffen Klassert 	if (!inst) {
3145068c7a8SSteffen Klassert 		inst = ERR_PTR(-ENOMEM);
3155068c7a8SSteffen Klassert 		goto out;
3165068c7a8SSteffen Klassert 	}
3175068c7a8SSteffen Klassert 
3185068c7a8SSteffen Klassert 	err = -ENAMETOOLONG;
3195068c7a8SSteffen Klassert 	if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME,
3205068c7a8SSteffen Klassert 		     "pcrypt(%s)", alg->cra_driver_name) >= CRYPTO_MAX_ALG_NAME)
3215068c7a8SSteffen Klassert 		goto out_free_inst;
3225068c7a8SSteffen Klassert 
3235068c7a8SSteffen Klassert 	memcpy(inst->alg.cra_name, alg->cra_name, CRYPTO_MAX_ALG_NAME);
3245068c7a8SSteffen Klassert 
3255068c7a8SSteffen Klassert 	ctx = crypto_instance_ctx(inst);
3265068c7a8SSteffen Klassert 	err = crypto_init_spawn(&ctx->spawn, alg, inst,
3275068c7a8SSteffen Klassert 				CRYPTO_ALG_TYPE_MASK);
3285068c7a8SSteffen Klassert 	if (err)
3295068c7a8SSteffen Klassert 		goto out_free_inst;
3305068c7a8SSteffen Klassert 
3315068c7a8SSteffen Klassert 	inst->alg.cra_priority = alg->cra_priority + 100;
3325068c7a8SSteffen Klassert 	inst->alg.cra_blocksize = alg->cra_blocksize;
3335068c7a8SSteffen Klassert 	inst->alg.cra_alignmask = alg->cra_alignmask;
3345068c7a8SSteffen Klassert 
3355068c7a8SSteffen Klassert out:
3365068c7a8SSteffen Klassert 	return inst;
3375068c7a8SSteffen Klassert 
3385068c7a8SSteffen Klassert out_free_inst:
3395068c7a8SSteffen Klassert 	kfree(inst);
3405068c7a8SSteffen Klassert 	inst = ERR_PTR(err);
3415068c7a8SSteffen Klassert 	goto out;
3425068c7a8SSteffen Klassert }
3435068c7a8SSteffen Klassert 
34480a6d7dbSDan Carpenter static struct crypto_instance *pcrypt_alloc_aead(struct rtattr **tb,
34580a6d7dbSDan Carpenter 						 u32 type, u32 mask)
3465068c7a8SSteffen Klassert {
3475068c7a8SSteffen Klassert 	struct crypto_instance *inst;
3485068c7a8SSteffen Klassert 	struct crypto_alg *alg;
3495068c7a8SSteffen Klassert 
35080a6d7dbSDan Carpenter 	alg = crypto_get_attr_alg(tb, type, (mask & CRYPTO_ALG_TYPE_MASK));
3515068c7a8SSteffen Klassert 	if (IS_ERR(alg))
3525068c7a8SSteffen Klassert 		return ERR_CAST(alg);
3535068c7a8SSteffen Klassert 
3545068c7a8SSteffen Klassert 	inst = pcrypt_alloc_instance(alg);
3555068c7a8SSteffen Klassert 	if (IS_ERR(inst))
3565068c7a8SSteffen Klassert 		goto out_put_alg;
3575068c7a8SSteffen Klassert 
3585068c7a8SSteffen Klassert 	inst->alg.cra_flags = CRYPTO_ALG_TYPE_AEAD | CRYPTO_ALG_ASYNC;
3595068c7a8SSteffen Klassert 	inst->alg.cra_type = &crypto_aead_type;
3605068c7a8SSteffen Klassert 
3615068c7a8SSteffen Klassert 	inst->alg.cra_aead.ivsize = alg->cra_aead.ivsize;
3625068c7a8SSteffen Klassert 	inst->alg.cra_aead.geniv = alg->cra_aead.geniv;
3635068c7a8SSteffen Klassert 	inst->alg.cra_aead.maxauthsize = alg->cra_aead.maxauthsize;
3645068c7a8SSteffen Klassert 
3655068c7a8SSteffen Klassert 	inst->alg.cra_ctxsize = sizeof(struct pcrypt_aead_ctx);
3665068c7a8SSteffen Klassert 
3675068c7a8SSteffen Klassert 	inst->alg.cra_init = pcrypt_aead_init_tfm;
3685068c7a8SSteffen Klassert 	inst->alg.cra_exit = pcrypt_aead_exit_tfm;
3695068c7a8SSteffen Klassert 
3705068c7a8SSteffen Klassert 	inst->alg.cra_aead.setkey = pcrypt_aead_setkey;
3715068c7a8SSteffen Klassert 	inst->alg.cra_aead.setauthsize = pcrypt_aead_setauthsize;
3725068c7a8SSteffen Klassert 	inst->alg.cra_aead.encrypt = pcrypt_aead_encrypt;
3735068c7a8SSteffen Klassert 	inst->alg.cra_aead.decrypt = pcrypt_aead_decrypt;
3745068c7a8SSteffen Klassert 	inst->alg.cra_aead.givencrypt = pcrypt_aead_givencrypt;
3755068c7a8SSteffen Klassert 
3765068c7a8SSteffen Klassert out_put_alg:
3775068c7a8SSteffen Klassert 	crypto_mod_put(alg);
3785068c7a8SSteffen Klassert 	return inst;
3795068c7a8SSteffen Klassert }
3805068c7a8SSteffen Klassert 
3815068c7a8SSteffen Klassert static struct crypto_instance *pcrypt_alloc(struct rtattr **tb)
3825068c7a8SSteffen Klassert {
3835068c7a8SSteffen Klassert 	struct crypto_attr_type *algt;
3845068c7a8SSteffen Klassert 
3855068c7a8SSteffen Klassert 	algt = crypto_get_attr_type(tb);
3865068c7a8SSteffen Klassert 	if (IS_ERR(algt))
3875068c7a8SSteffen Klassert 		return ERR_CAST(algt);
3885068c7a8SSteffen Klassert 
3895068c7a8SSteffen Klassert 	switch (algt->type & algt->mask & CRYPTO_ALG_TYPE_MASK) {
3905068c7a8SSteffen Klassert 	case CRYPTO_ALG_TYPE_AEAD:
39180a6d7dbSDan Carpenter 		return pcrypt_alloc_aead(tb, algt->type, algt->mask);
3925068c7a8SSteffen Klassert 	}
3935068c7a8SSteffen Klassert 
3945068c7a8SSteffen Klassert 	return ERR_PTR(-EINVAL);
3955068c7a8SSteffen Klassert }
3965068c7a8SSteffen Klassert 
3975068c7a8SSteffen Klassert static void pcrypt_free(struct crypto_instance *inst)
3985068c7a8SSteffen Klassert {
3995068c7a8SSteffen Klassert 	struct pcrypt_instance_ctx *ctx = crypto_instance_ctx(inst);
4005068c7a8SSteffen Klassert 
4015068c7a8SSteffen Klassert 	crypto_drop_spawn(&ctx->spawn);
4025068c7a8SSteffen Klassert 	kfree(inst);
4035068c7a8SSteffen Klassert }
4045068c7a8SSteffen Klassert 
405e15bacbeSDan Kruchinin static int pcrypt_cpumask_change_notify(struct notifier_block *self,
406e15bacbeSDan Kruchinin 					unsigned long val, void *data)
407e15bacbeSDan Kruchinin {
408e15bacbeSDan Kruchinin 	struct pcrypt_instance *pcrypt;
409e15bacbeSDan Kruchinin 	struct pcrypt_cpumask *new_mask, *old_mask;
410e15bacbeSDan Kruchinin 
411e15bacbeSDan Kruchinin 	if (!(val & PADATA_CPU_SERIAL))
412e15bacbeSDan Kruchinin 		return 0;
413e15bacbeSDan Kruchinin 
414e15bacbeSDan Kruchinin 	pcrypt = container_of(self, struct pcrypt_instance, nblock);
415e15bacbeSDan Kruchinin 	new_mask = kmalloc(sizeof(*new_mask), GFP_KERNEL);
416e15bacbeSDan Kruchinin 	if (!new_mask)
417e15bacbeSDan Kruchinin 		return -ENOMEM;
418e15bacbeSDan Kruchinin 	if (!alloc_cpumask_var(&new_mask->mask, GFP_KERNEL)) {
419e15bacbeSDan Kruchinin 		kfree(new_mask);
420e15bacbeSDan Kruchinin 		return -ENOMEM;
421e15bacbeSDan Kruchinin 	}
422e15bacbeSDan Kruchinin 
423e15bacbeSDan Kruchinin 	old_mask = pcrypt->cb_cpumask;
424e15bacbeSDan Kruchinin 
425e15bacbeSDan Kruchinin 	padata_get_cpumask(pcrypt->pinst, PADATA_CPU_SERIAL, new_mask->mask);
426e15bacbeSDan Kruchinin 	rcu_assign_pointer(pcrypt->cb_cpumask, new_mask);
427e15bacbeSDan Kruchinin 	synchronize_rcu_bh();
428e15bacbeSDan Kruchinin 
429e15bacbeSDan Kruchinin 	free_cpumask_var(old_mask->mask);
430e15bacbeSDan Kruchinin 	kfree(old_mask);
431e15bacbeSDan Kruchinin 	return 0;
432e15bacbeSDan Kruchinin }
433e15bacbeSDan Kruchinin 
434*a3fb1e33SDan Kruchinin static int pcrypt_sysfs_add(struct padata_instance *pinst, const char *name)
435*a3fb1e33SDan Kruchinin {
436*a3fb1e33SDan Kruchinin 	int ret;
437*a3fb1e33SDan Kruchinin 
438*a3fb1e33SDan Kruchinin 	pinst->kobj.kset = pcrypt_kset;
439*a3fb1e33SDan Kruchinin 	ret = kobject_add(&pinst->kobj, NULL, name);
440*a3fb1e33SDan Kruchinin 	if (!ret)
441*a3fb1e33SDan Kruchinin 		kobject_uevent(&pinst->kobj, KOBJ_ADD);
442*a3fb1e33SDan Kruchinin 
443*a3fb1e33SDan Kruchinin 	return ret;
444*a3fb1e33SDan Kruchinin }
445*a3fb1e33SDan Kruchinin 
446e15bacbeSDan Kruchinin static int __pcrypt_init_instance(struct pcrypt_instance *pcrypt,
447e15bacbeSDan Kruchinin 				  const char *name)
448e15bacbeSDan Kruchinin {
449e15bacbeSDan Kruchinin 	int ret = -ENOMEM;
450e15bacbeSDan Kruchinin 	struct pcrypt_cpumask *mask;
451e15bacbeSDan Kruchinin 
452*a3fb1e33SDan Kruchinin 	pcrypt->name = name;
453e15bacbeSDan Kruchinin 	pcrypt->wq = create_workqueue(name);
454e15bacbeSDan Kruchinin 	if (!pcrypt->wq)
455e15bacbeSDan Kruchinin 		goto err;
456e15bacbeSDan Kruchinin 
457e15bacbeSDan Kruchinin 	pcrypt->pinst = padata_alloc(pcrypt->wq);
458e15bacbeSDan Kruchinin 	if (!pcrypt->pinst)
459e15bacbeSDan Kruchinin 		goto err_destroy_workqueue;
460e15bacbeSDan Kruchinin 
461e15bacbeSDan Kruchinin 	mask = kmalloc(sizeof(*mask), GFP_KERNEL);
462e15bacbeSDan Kruchinin 	if (!mask)
463e15bacbeSDan Kruchinin 		goto err_free_padata;
464e15bacbeSDan Kruchinin 	if (!alloc_cpumask_var(&mask->mask, GFP_KERNEL)) {
465e15bacbeSDan Kruchinin 		kfree(mask);
466e15bacbeSDan Kruchinin 		goto err_free_padata;
467e15bacbeSDan Kruchinin 	}
468e15bacbeSDan Kruchinin 
469e15bacbeSDan Kruchinin 	padata_get_cpumask(pcrypt->pinst, PADATA_CPU_SERIAL, mask->mask);
470e15bacbeSDan Kruchinin 	rcu_assign_pointer(pcrypt->cb_cpumask, mask);
471e15bacbeSDan Kruchinin 
472e15bacbeSDan Kruchinin 	pcrypt->nblock.notifier_call = pcrypt_cpumask_change_notify;
473e15bacbeSDan Kruchinin 	ret = padata_register_cpumask_notifier(pcrypt->pinst, &pcrypt->nblock);
474e15bacbeSDan Kruchinin 	if (ret)
475e15bacbeSDan Kruchinin 		goto err_free_cpumask;
476e15bacbeSDan Kruchinin 
477*a3fb1e33SDan Kruchinin 	ret = pcrypt_sysfs_add(pcrypt->pinst, name);
478*a3fb1e33SDan Kruchinin 	if (ret)
479*a3fb1e33SDan Kruchinin 		goto err_unregister_notifier;
480*a3fb1e33SDan Kruchinin 
481e15bacbeSDan Kruchinin 	return ret;
482*a3fb1e33SDan Kruchinin err_unregister_notifier:
483*a3fb1e33SDan Kruchinin 	padata_unregister_cpumask_notifier(pcrypt->pinst, &pcrypt->nblock);
484e15bacbeSDan Kruchinin err_free_cpumask:
485e15bacbeSDan Kruchinin 	free_cpumask_var(mask->mask);
486e15bacbeSDan Kruchinin 	kfree(mask);
487e15bacbeSDan Kruchinin err_free_padata:
488e15bacbeSDan Kruchinin 	padata_free(pcrypt->pinst);
489e15bacbeSDan Kruchinin err_destroy_workqueue:
490e15bacbeSDan Kruchinin 	destroy_workqueue(pcrypt->wq);
491e15bacbeSDan Kruchinin err:
492e15bacbeSDan Kruchinin 	return ret;
493e15bacbeSDan Kruchinin }
494e15bacbeSDan Kruchinin 
495e15bacbeSDan Kruchinin static void __pcrypt_deinit_instance(struct pcrypt_instance *pcrypt)
496e15bacbeSDan Kruchinin {
497*a3fb1e33SDan Kruchinin 	kobject_put(&pcrypt->pinst->kobj);
498e15bacbeSDan Kruchinin 	free_cpumask_var(pcrypt->cb_cpumask->mask);
499e15bacbeSDan Kruchinin 	kfree(pcrypt->cb_cpumask);
500e15bacbeSDan Kruchinin 
501e15bacbeSDan Kruchinin 	padata_stop(pcrypt->pinst);
502e15bacbeSDan Kruchinin 	padata_unregister_cpumask_notifier(pcrypt->pinst, &pcrypt->nblock);
503e15bacbeSDan Kruchinin 	destroy_workqueue(pcrypt->wq);
504e15bacbeSDan Kruchinin 	padata_free(pcrypt->pinst);
505e15bacbeSDan Kruchinin }
506e15bacbeSDan Kruchinin 
5075068c7a8SSteffen Klassert static struct crypto_template pcrypt_tmpl = {
5085068c7a8SSteffen Klassert 	.name = "pcrypt",
5095068c7a8SSteffen Klassert 	.alloc = pcrypt_alloc,
5105068c7a8SSteffen Klassert 	.free = pcrypt_free,
5115068c7a8SSteffen Klassert 	.module = THIS_MODULE,
5125068c7a8SSteffen Klassert };
5135068c7a8SSteffen Klassert 
5145068c7a8SSteffen Klassert static int __init pcrypt_init(void)
5155068c7a8SSteffen Klassert {
516*a3fb1e33SDan Kruchinin 	int err = -ENOMEM;
517*a3fb1e33SDan Kruchinin 
518*a3fb1e33SDan Kruchinin 	pcrypt_kset = kset_create_and_add("pcrypt", NULL, kernel_kobj);
519*a3fb1e33SDan Kruchinin 	if (!pcrypt_kset)
520*a3fb1e33SDan Kruchinin 		goto err;
521e15bacbeSDan Kruchinin 
522e15bacbeSDan Kruchinin 	err = __pcrypt_init_instance(&pencrypt, "pencrypt");
523e15bacbeSDan Kruchinin 	if (err)
524*a3fb1e33SDan Kruchinin 		goto err_unreg_kset;
5255068c7a8SSteffen Klassert 
526e15bacbeSDan Kruchinin 	err = __pcrypt_init_instance(&pdecrypt, "pdecrypt");
5274c879170SSteffen Klassert 	if (err)
528e15bacbeSDan Kruchinin 		goto err_deinit_pencrypt;
5294c879170SSteffen Klassert 
530e15bacbeSDan Kruchinin 	padata_start(pencrypt.pinst);
531e15bacbeSDan Kruchinin 	padata_start(pdecrypt.pinst);
5325068c7a8SSteffen Klassert 
5335068c7a8SSteffen Klassert 	return crypto_register_template(&pcrypt_tmpl);
5345068c7a8SSteffen Klassert 
535e15bacbeSDan Kruchinin err_deinit_pencrypt:
536e15bacbeSDan Kruchinin 	__pcrypt_deinit_instance(&pencrypt);
537*a3fb1e33SDan Kruchinin err_unreg_kset:
538*a3fb1e33SDan Kruchinin 	kset_unregister(pcrypt_kset);
5395068c7a8SSteffen Klassert err:
5404c879170SSteffen Klassert 	return err;
5415068c7a8SSteffen Klassert }
5425068c7a8SSteffen Klassert 
5435068c7a8SSteffen Klassert static void __exit pcrypt_exit(void)
5445068c7a8SSteffen Klassert {
545e15bacbeSDan Kruchinin 	__pcrypt_deinit_instance(&pencrypt);
546e15bacbeSDan Kruchinin 	__pcrypt_deinit_instance(&pdecrypt);
5475068c7a8SSteffen Klassert 
548*a3fb1e33SDan Kruchinin 	kset_unregister(pcrypt_kset);
5495068c7a8SSteffen Klassert 	crypto_unregister_template(&pcrypt_tmpl);
5505068c7a8SSteffen Klassert }
5515068c7a8SSteffen Klassert 
5525068c7a8SSteffen Klassert module_init(pcrypt_init);
5535068c7a8SSteffen Klassert module_exit(pcrypt_exit);
5545068c7a8SSteffen Klassert 
5555068c7a8SSteffen Klassert MODULE_LICENSE("GPL");
5565068c7a8SSteffen Klassert MODULE_AUTHOR("Steffen Klassert <steffen.klassert@secunet.com>");
5575068c7a8SSteffen Klassert MODULE_DESCRIPTION("Parallel crypto wrapper");
558