crc-t10dif.c 3.0 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13
/*
 * T10 Data Integrity Field CRC16 calculation
 *
 * Copyright (c) 2007 Oracle Corporation.  All rights reserved.
 * Written by Martin K. Petersen <martin.petersen@oracle.com>
 *
 * This source code is licensed under the GNU General Public License,
 * Version 2. See the file COPYING for more details.
 */

#include <linux/types.h>
#include <linux/module.h>
#include <linux/crc-t10dif.h>
14 15 16
#include <linux/err.h>
#include <linux/init.h>
#include <crypto/hash.h>
17
#include <crypto/algapi.h>
18
#include <linux/static_key.h>
19
#include <linux/notifier.h>
20

21
static struct crypto_shash __rcu *crct10dif_tfm;
22
static struct static_key crct10dif_fallback __read_mostly;
23
static DEFINE_MUTEX(crc_t10dif_mutex);
24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

static int crc_t10dif_rehash(struct notifier_block *self, unsigned long val, void *data)
{
	struct crypto_alg *alg = data;
	struct crypto_shash *new, *old;

	if (val != CRYPTO_MSG_ALG_LOADED ||
	    static_key_false(&crct10dif_fallback) ||
	    strncmp(alg->cra_name, CRC_T10DIF_STRING, strlen(CRC_T10DIF_STRING)))
		return 0;

	mutex_lock(&crc_t10dif_mutex);
	old = rcu_dereference_protected(crct10dif_tfm,
					lockdep_is_held(&crc_t10dif_mutex));
	if (!old) {
		mutex_unlock(&crc_t10dif_mutex);
		return 0;
	}
	new = crypto_alloc_shash("crct10dif", 0, 0);
	if (IS_ERR(new)) {
		mutex_unlock(&crc_t10dif_mutex);
		return 0;
	}
	rcu_assign_pointer(crct10dif_tfm, new);
	mutex_unlock(&crc_t10dif_mutex);

	synchronize_rcu();
	crypto_free_shash(old);
	return 0;
}

static struct notifier_block crc_t10dif_nb = {
	.notifier_call = crc_t10dif_rehash,
};
58

59
__u16 crc_t10dif_update(__u16 crc, const unsigned char *buffer, size_t len)
60
{
61 62 63 64 65 66
	struct {
		struct shash_desc shash;
		char ctx[2];
	} desc;
	int err;

67
	if (static_key_false(&crct10dif_fallback))
68
		return crc_t10dif_generic(crc, buffer, len);
69

70 71
	rcu_read_lock();
	desc.shash.tfm = rcu_dereference(crct10dif_tfm);
72
	desc.shash.flags = 0;
73
	*(__u16 *)desc.ctx = crc;
74

75
	err = crypto_shash_update(&desc.shash, buffer, len);
76 77
	rcu_read_unlock();

78
	BUG_ON(err);
79

80
	return *(__u16 *)desc.ctx;
81
}
82 83 84 85 86 87
EXPORT_SYMBOL(crc_t10dif_update);

__u16 crc_t10dif(const unsigned char *buffer, size_t len)
{
	return crc_t10dif_update(0, buffer, len);
}
88 89
EXPORT_SYMBOL(crc_t10dif);

90 91
static int __init crc_t10dif_mod_init(void)
{
92
	crypto_register_notifier(&crc_t10dif_nb);
93
	crct10dif_tfm = crypto_alloc_shash("crct10dif", 0, 0);
94 95 96 97 98
	if (IS_ERR(crct10dif_tfm)) {
		static_key_slow_inc(&crct10dif_fallback);
		crct10dif_tfm = NULL;
	}
	return 0;
99 100 101 102
}

static void __exit crc_t10dif_mod_fini(void)
{
103
	crypto_unregister_notifier(&crc_t10dif_nb);
104 105 106 107 108 109
	crypto_free_shash(crct10dif_tfm);
}

module_init(crc_t10dif_mod_init);
module_exit(crc_t10dif_mod_fini);

110 111 112 113 114 115 116 117 118 119 120
static int crc_t10dif_transform_show(char *buffer, const struct kernel_param *kp)
{
	if (static_key_false(&crct10dif_fallback))
		return sprintf(buffer, "fallback\n");

	return sprintf(buffer, "%s\n",
		crypto_tfm_alg_driver_name(crypto_shash_tfm(crct10dif_tfm)));
}

module_param_call(transform, NULL, crc_t10dif_transform_show, NULL, 0644);

121 122
MODULE_DESCRIPTION("T10 DIF CRC calculation");
MODULE_LICENSE("GPL");
123
MODULE_SOFTDEP("pre: crct10dif");