QAPI's 'prefix' feature can make the connection between enumeration type and its constants less than obvious. It's best used with restraint. QCryptodevBackendAlgType has a 'prefix' that overrides the generated enumeration constants' prefix to QCRYPTODEV_BACKEND_ALG. We could simply drop 'prefix', but I think the abbreviation "alg" is less than clear. Additionally rename the type to QCryptodevBackendAlgoType. The prefix becomes QCRYPTODEV_BACKEND_ALGO_TYPE. Signed-off-by: Markus Armbruster <armbru@redhat.com> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> Message-ID: <20240904111836.3273842-19-armbru@redhat.com>
		
			
				
	
	
		
			643 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			643 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * QEMU Cryptodev backend for QEMU cipher APIs
 | 
						|
 *
 | 
						|
 * Copyright (c) 2022 Bytedance.Inc
 | 
						|
 *
 | 
						|
 * Authors:
 | 
						|
 *    lei he <helei.sig11@bytedance.com>
 | 
						|
 *
 | 
						|
 * This library is free software; you can redistribute it and/or
 | 
						|
 * modify it under the terms of the GNU Lesser General Public
 | 
						|
 * License as published by the Free Software Foundation; either
 | 
						|
 * version 2.1 of the License, or (at your option) any later version.
 | 
						|
 *
 | 
						|
 * This library is distributed in the hope that it will be useful,
 | 
						|
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | 
						|
 * Lesser General Public License for more details.
 | 
						|
 *
 | 
						|
 * You should have received a copy of the GNU Lesser General Public
 | 
						|
 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
 | 
						|
 *
 | 
						|
 */
 | 
						|
 | 
						|
#include "qemu/osdep.h"
 | 
						|
#include "crypto/cipher.h"
 | 
						|
#include "crypto/akcipher.h"
 | 
						|
#include "qapi/error.h"
 | 
						|
#include "qemu/main-loop.h"
 | 
						|
#include "qemu/thread.h"
 | 
						|
#include "qemu/error-report.h"
 | 
						|
#include "qemu/queue.h"
 | 
						|
#include "qom/object.h"
 | 
						|
#include "sysemu/cryptodev.h"
 | 
						|
#include "standard-headers/linux/virtio_crypto.h"
 | 
						|
 | 
						|
#include <keyutils.h>
 | 
						|
#include <sys/eventfd.h>
 | 
						|
 | 
						|
/**
 | 
						|
 * @TYPE_CRYPTODEV_BACKEND_LKCF:
 | 
						|
 * name of backend that uses linux kernel crypto framework
 | 
						|
 */
 | 
						|
#define TYPE_CRYPTODEV_BACKEND_LKCF "cryptodev-backend-lkcf"
 | 
						|
 | 
						|
OBJECT_DECLARE_SIMPLE_TYPE(CryptoDevBackendLKCF, CRYPTODEV_BACKEND_LKCF)
 | 
						|
 | 
						|
#define INVALID_KEY_ID -1
 | 
						|
#define MAX_SESSIONS 256
 | 
						|
#define NR_WORKER_THREAD 64
 | 
						|
 | 
						|
#define KCTL_KEY_TYPE_PKEY "asymmetric"
 | 
						|
/**
 | 
						|
 * Here the key is uploaded to the thread-keyring of worker thread, at least
 | 
						|
 * util linux-6.0:
 | 
						|
 * 1. process keyring seems to behave unexpectedly if main-thread does not
 | 
						|
 * create the keyring before creating any other thread.
 | 
						|
 * 2. at present, the guest kernel never perform multiple operations on a
 | 
						|
 * session.
 | 
						|
 * 3. it can reduce the load of the main-loop because the key passed by the
 | 
						|
 * guest kernel has been already checked.
 | 
						|
 */
 | 
						|
#define KCTL_KEY_RING KEY_SPEC_THREAD_KEYRING
 | 
						|
 | 
						|
typedef struct CryptoDevBackendLKCFSession {
 | 
						|
    uint8_t *key;
 | 
						|
    size_t keylen;
 | 
						|
    QCryptoAkCipherKeyType keytype;
 | 
						|
    QCryptoAkCipherOptions akcipher_opts;
 | 
						|
} CryptoDevBackendLKCFSession;
 | 
						|
 | 
						|
typedef struct CryptoDevBackendLKCF CryptoDevBackendLKCF;
 | 
						|
typedef struct CryptoDevLKCFTask CryptoDevLKCFTask;
 | 
						|
struct CryptoDevLKCFTask {
 | 
						|
    CryptoDevBackendLKCFSession *sess;
 | 
						|
    CryptoDevBackendOpInfo *op_info;
 | 
						|
    CryptoDevCompletionFunc cb;
 | 
						|
    void *opaque;
 | 
						|
    int status;
 | 
						|
    CryptoDevBackendLKCF *lkcf;
 | 
						|
    QSIMPLEQ_ENTRY(CryptoDevLKCFTask) queue;
 | 
						|
};
 | 
						|
 | 
						|
typedef struct CryptoDevBackendLKCF {
 | 
						|
    CryptoDevBackend parent_obj;
 | 
						|
    CryptoDevBackendLKCFSession *sess[MAX_SESSIONS];
 | 
						|
    QSIMPLEQ_HEAD(, CryptoDevLKCFTask) requests;
 | 
						|
    QSIMPLEQ_HEAD(, CryptoDevLKCFTask) responses;
 | 
						|
    QemuMutex mutex;
 | 
						|
    QemuCond cond;
 | 
						|
    QemuMutex rsp_mutex;
 | 
						|
 | 
						|
    /**
 | 
						|
     * There is no async interface for asymmetric keys like AF_ALG sockets,
 | 
						|
     * we don't seem to have better way than create a lots of thread.
 | 
						|
     */
 | 
						|
    QemuThread worker_threads[NR_WORKER_THREAD];
 | 
						|
    bool running;
 | 
						|
    int eventfd;
 | 
						|
} CryptoDevBackendLKCF;
 | 
						|
 | 
						|
static void *cryptodev_lkcf_worker(void *arg);
 | 
						|
static int cryptodev_lkcf_close_session(CryptoDevBackend *backend,
 | 
						|
                                        uint64_t session_id,
 | 
						|
                                        uint32_t queue_index,
 | 
						|
                                        CryptoDevCompletionFunc cb,
 | 
						|
                                        void *opaque);
 | 
						|
 | 
						|
static void cryptodev_lkcf_handle_response(void *opaque)
 | 
						|
{
 | 
						|
    CryptoDevBackendLKCF *lkcf = (CryptoDevBackendLKCF *)opaque;
 | 
						|
    QSIMPLEQ_HEAD(, CryptoDevLKCFTask) responses;
 | 
						|
    CryptoDevLKCFTask *task, *next;
 | 
						|
    eventfd_t nevent;
 | 
						|
 | 
						|
    QSIMPLEQ_INIT(&responses);
 | 
						|
    eventfd_read(lkcf->eventfd, &nevent);
 | 
						|
 | 
						|
    qemu_mutex_lock(&lkcf->rsp_mutex);
 | 
						|
    QSIMPLEQ_PREPEND(&responses, &lkcf->responses);
 | 
						|
    qemu_mutex_unlock(&lkcf->rsp_mutex);
 | 
						|
 | 
						|
    QSIMPLEQ_FOREACH_SAFE(task, &responses, queue, next) {
 | 
						|
        if (task->cb) {
 | 
						|
            task->cb(task->opaque, task->status);
 | 
						|
        }
 | 
						|
        g_free(task);
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
static int cryptodev_lkcf_set_op_desc(QCryptoAkCipherOptions *opts,
 | 
						|
                                      char *key_desc,
 | 
						|
                                      size_t desc_len,
 | 
						|
                                      Error **errp)
 | 
						|
{
 | 
						|
    QCryptoAkCipherOptionsRSA *rsa_opt;
 | 
						|
    if (opts->alg != QCRYPTO_AK_CIPHER_ALGO_RSA) {
 | 
						|
        error_setg(errp, "Unsupported alg: %u", opts->alg);
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    rsa_opt = &opts->u.rsa;
 | 
						|
    if (rsa_opt->padding_alg == QCRYPTO_RSA_PADDING_ALGO_PKCS1) {
 | 
						|
        snprintf(key_desc, desc_len, "enc=%s hash=%s",
 | 
						|
                 QCryptoRSAPaddingAlgo_str(rsa_opt->padding_alg),
 | 
						|
                 QCryptoHashAlgo_str(rsa_opt->hash_alg));
 | 
						|
 | 
						|
    } else {
 | 
						|
        snprintf(key_desc, desc_len, "enc=%s",
 | 
						|
                 QCryptoRSAPaddingAlgo_str(rsa_opt->padding_alg));
 | 
						|
    }
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int cryptodev_lkcf_set_rsa_opt(int virtio_padding_alg,
 | 
						|
                                      int virtio_hash_alg,
 | 
						|
                                      QCryptoAkCipherOptionsRSA *opt,
 | 
						|
                                      Error **errp)
 | 
						|
{
 | 
						|
    if (virtio_padding_alg == VIRTIO_CRYPTO_RSA_PKCS1_PADDING) {
 | 
						|
        opt->padding_alg = QCRYPTO_RSA_PADDING_ALGO_PKCS1;
 | 
						|
 | 
						|
        switch (virtio_hash_alg) {
 | 
						|
        case VIRTIO_CRYPTO_RSA_MD5:
 | 
						|
            opt->hash_alg = QCRYPTO_HASH_ALGO_MD5;
 | 
						|
            break;
 | 
						|
 | 
						|
        case VIRTIO_CRYPTO_RSA_SHA1:
 | 
						|
            opt->hash_alg = QCRYPTO_HASH_ALGO_SHA1;
 | 
						|
            break;
 | 
						|
 | 
						|
        case VIRTIO_CRYPTO_RSA_SHA256:
 | 
						|
            opt->hash_alg = QCRYPTO_HASH_ALGO_SHA256;
 | 
						|
            break;
 | 
						|
 | 
						|
        case VIRTIO_CRYPTO_RSA_SHA512:
 | 
						|
            opt->hash_alg = QCRYPTO_HASH_ALGO_SHA512;
 | 
						|
            break;
 | 
						|
 | 
						|
        default:
 | 
						|
            error_setg(errp, "Unsupported rsa hash algo: %d", virtio_hash_alg);
 | 
						|
            return -1;
 | 
						|
        }
 | 
						|
        return 0;
 | 
						|
    }
 | 
						|
 | 
						|
    if (virtio_padding_alg == VIRTIO_CRYPTO_RSA_RAW_PADDING) {
 | 
						|
        opt->padding_alg = QCRYPTO_RSA_PADDING_ALGO_RAW;
 | 
						|
        return 0;
 | 
						|
    }
 | 
						|
 | 
						|
    error_setg(errp, "Unsupported rsa padding algo: %u", virtio_padding_alg);
 | 
						|
    return -1;
 | 
						|
}
 | 
						|
 | 
						|
static int cryptodev_lkcf_get_unused_session_index(CryptoDevBackendLKCF *lkcf)
 | 
						|
{
 | 
						|
    size_t i;
 | 
						|
 | 
						|
    for (i = 0; i < MAX_SESSIONS; i++) {
 | 
						|
        if (lkcf->sess[i] == NULL) {
 | 
						|
            return i;
 | 
						|
        }
 | 
						|
    }
 | 
						|
    return -1;
 | 
						|
}
 | 
						|
 | 
						|
static void cryptodev_lkcf_init(CryptoDevBackend *backend, Error **errp)
 | 
						|
{
 | 
						|
    /* Only support one queue */
 | 
						|
    int queues = backend->conf.peers.queues, i;
 | 
						|
    CryptoDevBackendClient *cc;
 | 
						|
    CryptoDevBackendLKCF *lkcf =
 | 
						|
        CRYPTODEV_BACKEND_LKCF(backend);
 | 
						|
 | 
						|
    if (queues != 1) {
 | 
						|
        error_setg(errp,
 | 
						|
                   "Only support one queue in cryptodev-builtin backend");
 | 
						|
        return;
 | 
						|
    }
 | 
						|
    lkcf->eventfd = eventfd(0, 0);
 | 
						|
    if (lkcf->eventfd < 0) {
 | 
						|
        error_setg(errp, "Failed to create eventfd: %d", errno);
 | 
						|
        return;
 | 
						|
    }
 | 
						|
 | 
						|
    cc = cryptodev_backend_new_client();
 | 
						|
    cc->info_str = g_strdup_printf("cryptodev-lkcf0");
 | 
						|
    cc->queue_index = 0;
 | 
						|
    cc->type = QCRYPTODEV_BACKEND_TYPE_LKCF;
 | 
						|
    backend->conf.peers.ccs[0] = cc;
 | 
						|
 | 
						|
    backend->conf.crypto_services =
 | 
						|
        1u << QCRYPTODEV_BACKEND_SERVICE_TYPE_AKCIPHER;
 | 
						|
    backend->conf.akcipher_algo = 1u << VIRTIO_CRYPTO_AKCIPHER_RSA;
 | 
						|
    lkcf->running = true;
 | 
						|
 | 
						|
    QSIMPLEQ_INIT(&lkcf->requests);
 | 
						|
    QSIMPLEQ_INIT(&lkcf->responses);
 | 
						|
    qemu_mutex_init(&lkcf->mutex);
 | 
						|
    qemu_mutex_init(&lkcf->rsp_mutex);
 | 
						|
    qemu_cond_init(&lkcf->cond);
 | 
						|
    for (i = 0; i < NR_WORKER_THREAD; i++) {
 | 
						|
        qemu_thread_create(&lkcf->worker_threads[i], "lkcf-worker",
 | 
						|
                           cryptodev_lkcf_worker, lkcf, 0);
 | 
						|
    }
 | 
						|
    qemu_set_fd_handler(
 | 
						|
        lkcf->eventfd, cryptodev_lkcf_handle_response, NULL, lkcf);
 | 
						|
    cryptodev_backend_set_ready(backend, true);
 | 
						|
}
 | 
						|
 | 
						|
static void cryptodev_lkcf_cleanup(CryptoDevBackend *backend, Error **errp)
 | 
						|
{
 | 
						|
    CryptoDevBackendLKCF *lkcf = CRYPTODEV_BACKEND_LKCF(backend);
 | 
						|
    size_t i;
 | 
						|
    int queues = backend->conf.peers.queues;
 | 
						|
    CryptoDevBackendClient *cc;
 | 
						|
    CryptoDevLKCFTask *task, *next;
 | 
						|
 | 
						|
    qemu_mutex_lock(&lkcf->mutex);
 | 
						|
    lkcf->running = false;
 | 
						|
    qemu_mutex_unlock(&lkcf->mutex);
 | 
						|
    qemu_cond_broadcast(&lkcf->cond);
 | 
						|
 | 
						|
    close(lkcf->eventfd);
 | 
						|
    for (i = 0; i < NR_WORKER_THREAD; i++) {
 | 
						|
        qemu_thread_join(&lkcf->worker_threads[i]);
 | 
						|
    }
 | 
						|
 | 
						|
    QSIMPLEQ_FOREACH_SAFE(task, &lkcf->requests, queue, next) {
 | 
						|
        if (task->cb) {
 | 
						|
            task->cb(task->opaque, task->status);
 | 
						|
        }
 | 
						|
        g_free(task);
 | 
						|
    }
 | 
						|
 | 
						|
    QSIMPLEQ_FOREACH_SAFE(task, &lkcf->responses, queue, next) {
 | 
						|
        if (task->cb) {
 | 
						|
            task->cb(task->opaque, task->status);
 | 
						|
        }
 | 
						|
        g_free(task);
 | 
						|
    }
 | 
						|
 | 
						|
    qemu_mutex_destroy(&lkcf->mutex);
 | 
						|
    qemu_cond_destroy(&lkcf->cond);
 | 
						|
    qemu_mutex_destroy(&lkcf->rsp_mutex);
 | 
						|
 | 
						|
    for (i = 0; i < MAX_SESSIONS; i++) {
 | 
						|
        if (lkcf->sess[i] != NULL) {
 | 
						|
            cryptodev_lkcf_close_session(backend, i, 0, NULL, NULL);
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    for (i = 0; i < queues; i++) {
 | 
						|
        cc = backend->conf.peers.ccs[i];
 | 
						|
        if (cc) {
 | 
						|
            cryptodev_backend_free_client(cc);
 | 
						|
            backend->conf.peers.ccs[i] = NULL;
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    cryptodev_backend_set_ready(backend, false);
 | 
						|
}
 | 
						|
 | 
						|
static void cryptodev_lkcf_execute_task(CryptoDevLKCFTask *task)
 | 
						|
{
 | 
						|
    CryptoDevBackendLKCFSession *session = task->sess;
 | 
						|
    CryptoDevBackendAsymOpInfo *asym_op_info;
 | 
						|
    bool kick = false;
 | 
						|
    int ret, status, op_code = task->op_info->op_code;
 | 
						|
    size_t p8info_len;
 | 
						|
    g_autofree uint8_t *p8info = NULL;
 | 
						|
    Error *local_error = NULL;
 | 
						|
    key_serial_t key_id = INVALID_KEY_ID;
 | 
						|
    char op_desc[64];
 | 
						|
    g_autoptr(QCryptoAkCipher) akcipher = NULL;
 | 
						|
 | 
						|
    /**
 | 
						|
     * We only offload private key session:
 | 
						|
     * 1. currently, the Linux kernel can only accept public key wrapped
 | 
						|
     * with X.509 certificates, but unfortunately the cost of making a
 | 
						|
     * ceritificate with public key is too expensive.
 | 
						|
     * 2. generally, public key related compution is fast, just compute it with
 | 
						|
     * thread-pool.
 | 
						|
     */
 | 
						|
    if (session->keytype == QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE) {
 | 
						|
        if (qcrypto_akcipher_export_p8info(&session->akcipher_opts,
 | 
						|
                                           session->key, session->keylen,
 | 
						|
                                           &p8info, &p8info_len,
 | 
						|
                                           &local_error) != 0 ||
 | 
						|
            cryptodev_lkcf_set_op_desc(&session->akcipher_opts, op_desc,
 | 
						|
                                       sizeof(op_desc), &local_error) != 0) {
 | 
						|
            error_report_err(local_error);
 | 
						|
        } else {
 | 
						|
            key_id = add_key(KCTL_KEY_TYPE_PKEY, "lkcf-backend-priv-key",
 | 
						|
                             p8info, p8info_len, KCTL_KEY_RING);
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    if (key_id < 0) {
 | 
						|
        if (!qcrypto_akcipher_supports(&session->akcipher_opts)) {
 | 
						|
            status = -VIRTIO_CRYPTO_NOTSUPP;
 | 
						|
            goto out;
 | 
						|
        }
 | 
						|
        akcipher = qcrypto_akcipher_new(&session->akcipher_opts,
 | 
						|
                                        session->keytype,
 | 
						|
                                        session->key, session->keylen,
 | 
						|
                                        &local_error);
 | 
						|
        if (!akcipher) {
 | 
						|
            status = -VIRTIO_CRYPTO_ERR;
 | 
						|
            goto out;
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    asym_op_info = task->op_info->u.asym_op_info;
 | 
						|
    switch (op_code) {
 | 
						|
    case VIRTIO_CRYPTO_AKCIPHER_ENCRYPT:
 | 
						|
        if (key_id >= 0) {
 | 
						|
            ret = keyctl_pkey_encrypt(key_id, op_desc,
 | 
						|
                asym_op_info->src, asym_op_info->src_len,
 | 
						|
                asym_op_info->dst, asym_op_info->dst_len);
 | 
						|
        } else {
 | 
						|
            ret = qcrypto_akcipher_encrypt(akcipher,
 | 
						|
                asym_op_info->src, asym_op_info->src_len,
 | 
						|
                asym_op_info->dst, asym_op_info->dst_len, &local_error);
 | 
						|
        }
 | 
						|
        break;
 | 
						|
 | 
						|
    case VIRTIO_CRYPTO_AKCIPHER_DECRYPT:
 | 
						|
        if (key_id >= 0) {
 | 
						|
            ret = keyctl_pkey_decrypt(key_id, op_desc,
 | 
						|
                asym_op_info->src, asym_op_info->src_len,
 | 
						|
                asym_op_info->dst, asym_op_info->dst_len);
 | 
						|
        } else {
 | 
						|
            ret = qcrypto_akcipher_decrypt(akcipher,
 | 
						|
                asym_op_info->src, asym_op_info->src_len,
 | 
						|
                asym_op_info->dst, asym_op_info->dst_len, &local_error);
 | 
						|
        }
 | 
						|
        break;
 | 
						|
 | 
						|
    case VIRTIO_CRYPTO_AKCIPHER_SIGN:
 | 
						|
        if (key_id >= 0) {
 | 
						|
            ret = keyctl_pkey_sign(key_id, op_desc,
 | 
						|
                asym_op_info->src, asym_op_info->src_len,
 | 
						|
                asym_op_info->dst, asym_op_info->dst_len);
 | 
						|
        } else {
 | 
						|
            ret = qcrypto_akcipher_sign(akcipher,
 | 
						|
                asym_op_info->src, asym_op_info->src_len,
 | 
						|
                asym_op_info->dst, asym_op_info->dst_len, &local_error);
 | 
						|
        }
 | 
						|
        break;
 | 
						|
 | 
						|
    case VIRTIO_CRYPTO_AKCIPHER_VERIFY:
 | 
						|
        if (key_id >= 0) {
 | 
						|
            ret = keyctl_pkey_verify(key_id, op_desc,
 | 
						|
                asym_op_info->src, asym_op_info->src_len,
 | 
						|
                asym_op_info->dst, asym_op_info->dst_len);
 | 
						|
        } else {
 | 
						|
            ret = qcrypto_akcipher_verify(akcipher,
 | 
						|
                asym_op_info->src, asym_op_info->src_len,
 | 
						|
                asym_op_info->dst, asym_op_info->dst_len, &local_error);
 | 
						|
        }
 | 
						|
        break;
 | 
						|
 | 
						|
    default:
 | 
						|
        error_setg(&local_error, "Unknown opcode: %u", op_code);
 | 
						|
        status = -VIRTIO_CRYPTO_ERR;
 | 
						|
        goto out;
 | 
						|
    }
 | 
						|
 | 
						|
    if (ret < 0) {
 | 
						|
        if (!local_error) {
 | 
						|
            if (errno != EKEYREJECTED) {
 | 
						|
                error_report("Failed do operation with keyctl: %d", errno);
 | 
						|
            }
 | 
						|
        } else {
 | 
						|
            error_report_err(local_error);
 | 
						|
        }
 | 
						|
        status = op_code == VIRTIO_CRYPTO_AKCIPHER_VERIFY ?
 | 
						|
            -VIRTIO_CRYPTO_KEY_REJECTED : -VIRTIO_CRYPTO_ERR;
 | 
						|
    } else {
 | 
						|
        status = VIRTIO_CRYPTO_OK;
 | 
						|
        asym_op_info->dst_len = ret;
 | 
						|
    }
 | 
						|
 | 
						|
out:
 | 
						|
    if (key_id >= 0) {
 | 
						|
        keyctl_unlink(key_id, KCTL_KEY_RING);
 | 
						|
    }
 | 
						|
    task->status = status;
 | 
						|
 | 
						|
    qemu_mutex_lock(&task->lkcf->rsp_mutex);
 | 
						|
    if (QSIMPLEQ_EMPTY(&task->lkcf->responses)) {
 | 
						|
        kick = true;
 | 
						|
    }
 | 
						|
    QSIMPLEQ_INSERT_TAIL(&task->lkcf->responses, task, queue);
 | 
						|
    qemu_mutex_unlock(&task->lkcf->rsp_mutex);
 | 
						|
 | 
						|
    if (kick) {
 | 
						|
        eventfd_write(task->lkcf->eventfd, 1);
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
static void *cryptodev_lkcf_worker(void *arg)
 | 
						|
{
 | 
						|
    CryptoDevBackendLKCF *backend = (CryptoDevBackendLKCF *)arg;
 | 
						|
    CryptoDevLKCFTask *task;
 | 
						|
 | 
						|
    for (;;) {
 | 
						|
        task = NULL;
 | 
						|
        qemu_mutex_lock(&backend->mutex);
 | 
						|
        while (backend->running && QSIMPLEQ_EMPTY(&backend->requests)) {
 | 
						|
            qemu_cond_wait(&backend->cond, &backend->mutex);
 | 
						|
        }
 | 
						|
        if (backend->running) {
 | 
						|
            task = QSIMPLEQ_FIRST(&backend->requests);
 | 
						|
            QSIMPLEQ_REMOVE_HEAD(&backend->requests, queue);
 | 
						|
        }
 | 
						|
        qemu_mutex_unlock(&backend->mutex);
 | 
						|
 | 
						|
        /* stopped */
 | 
						|
        if (!task) {
 | 
						|
            break;
 | 
						|
        }
 | 
						|
        cryptodev_lkcf_execute_task(task);
 | 
						|
   }
 | 
						|
 | 
						|
   return NULL;
 | 
						|
}
 | 
						|
 | 
						|
static int cryptodev_lkcf_operation(
 | 
						|
    CryptoDevBackend *backend,
 | 
						|
    CryptoDevBackendOpInfo *op_info)
 | 
						|
{
 | 
						|
    CryptoDevBackendLKCF *lkcf =
 | 
						|
        CRYPTODEV_BACKEND_LKCF(backend);
 | 
						|
    CryptoDevBackendLKCFSession *sess;
 | 
						|
    QCryptodevBackendAlgoType algtype = op_info->algtype;
 | 
						|
    CryptoDevLKCFTask *task;
 | 
						|
 | 
						|
    if (op_info->session_id >= MAX_SESSIONS ||
 | 
						|
        lkcf->sess[op_info->session_id] == NULL) {
 | 
						|
        error_report("Cannot find a valid session id: %" PRIu64 "",
 | 
						|
                     op_info->session_id);
 | 
						|
        return -VIRTIO_CRYPTO_INVSESS;
 | 
						|
    }
 | 
						|
 | 
						|
    sess = lkcf->sess[op_info->session_id];
 | 
						|
    if (algtype != QCRYPTODEV_BACKEND_ALGO_TYPE_ASYM) {
 | 
						|
        error_report("algtype not supported: %u", algtype);
 | 
						|
        return -VIRTIO_CRYPTO_NOTSUPP;
 | 
						|
    }
 | 
						|
 | 
						|
    task = g_new0(CryptoDevLKCFTask, 1);
 | 
						|
    task->op_info = op_info;
 | 
						|
    task->cb = op_info->cb;
 | 
						|
    task->opaque = op_info->opaque;
 | 
						|
    task->sess = sess;
 | 
						|
    task->lkcf = lkcf;
 | 
						|
    task->status = -VIRTIO_CRYPTO_ERR;
 | 
						|
 | 
						|
    qemu_mutex_lock(&lkcf->mutex);
 | 
						|
    QSIMPLEQ_INSERT_TAIL(&lkcf->requests, task, queue);
 | 
						|
    qemu_mutex_unlock(&lkcf->mutex);
 | 
						|
    qemu_cond_signal(&lkcf->cond);
 | 
						|
 | 
						|
    return VIRTIO_CRYPTO_OK;
 | 
						|
}
 | 
						|
 | 
						|
static int cryptodev_lkcf_create_asym_session(
 | 
						|
    CryptoDevBackendLKCF *lkcf,
 | 
						|
    CryptoDevBackendAsymSessionInfo *sess_info,
 | 
						|
    uint64_t *session_id)
 | 
						|
{
 | 
						|
    Error *local_error = NULL;
 | 
						|
    int index;
 | 
						|
    g_autofree CryptoDevBackendLKCFSession *sess =
 | 
						|
        g_new0(CryptoDevBackendLKCFSession, 1);
 | 
						|
 | 
						|
    switch (sess_info->algo) {
 | 
						|
    case VIRTIO_CRYPTO_AKCIPHER_RSA:
 | 
						|
        sess->akcipher_opts.alg = QCRYPTO_AK_CIPHER_ALGO_RSA;
 | 
						|
        if (cryptodev_lkcf_set_rsa_opt(
 | 
						|
            sess_info->u.rsa.padding_algo, sess_info->u.rsa.hash_algo,
 | 
						|
            &sess->akcipher_opts.u.rsa, &local_error) != 0) {
 | 
						|
            error_report_err(local_error);
 | 
						|
            return -VIRTIO_CRYPTO_ERR;
 | 
						|
        }
 | 
						|
        break;
 | 
						|
 | 
						|
    default:
 | 
						|
        error_report("Unsupported asym alg %u", sess_info->algo);
 | 
						|
        return -VIRTIO_CRYPTO_NOTSUPP;
 | 
						|
    }
 | 
						|
 | 
						|
    switch (sess_info->keytype) {
 | 
						|
    case VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PUBLIC:
 | 
						|
        sess->keytype = QCRYPTO_AK_CIPHER_KEY_TYPE_PUBLIC;
 | 
						|
        break;
 | 
						|
 | 
						|
    case VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PRIVATE:
 | 
						|
        sess->keytype = QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE;
 | 
						|
        break;
 | 
						|
 | 
						|
    default:
 | 
						|
        error_report("Unknown akcipher keytype: %u", sess_info->keytype);
 | 
						|
        return -VIRTIO_CRYPTO_ERR;
 | 
						|
    }
 | 
						|
 | 
						|
    index = cryptodev_lkcf_get_unused_session_index(lkcf);
 | 
						|
    if (index < 0) {
 | 
						|
        error_report("Total number of sessions created exceeds %u",
 | 
						|
                     MAX_SESSIONS);
 | 
						|
        return -VIRTIO_CRYPTO_ERR;
 | 
						|
    }
 | 
						|
 | 
						|
    sess->keylen = sess_info->keylen;
 | 
						|
    sess->key = g_malloc(sess_info->keylen);
 | 
						|
    memcpy(sess->key, sess_info->key, sess_info->keylen);
 | 
						|
 | 
						|
    lkcf->sess[index] = g_steal_pointer(&sess);
 | 
						|
    *session_id = index;
 | 
						|
 | 
						|
    return VIRTIO_CRYPTO_OK;
 | 
						|
}
 | 
						|
 | 
						|
static int cryptodev_lkcf_create_session(
 | 
						|
    CryptoDevBackend *backend,
 | 
						|
    CryptoDevBackendSessionInfo *sess_info,
 | 
						|
    uint32_t queue_index,
 | 
						|
    CryptoDevCompletionFunc cb,
 | 
						|
    void *opaque)
 | 
						|
{
 | 
						|
    CryptoDevBackendAsymSessionInfo *asym_sess_info;
 | 
						|
    CryptoDevBackendLKCF *lkcf =
 | 
						|
        CRYPTODEV_BACKEND_LKCF(backend);
 | 
						|
    int ret;
 | 
						|
 | 
						|
    switch (sess_info->op_code) {
 | 
						|
    case VIRTIO_CRYPTO_AKCIPHER_CREATE_SESSION:
 | 
						|
        asym_sess_info = &sess_info->u.asym_sess_info;
 | 
						|
        ret = cryptodev_lkcf_create_asym_session(
 | 
						|
            lkcf, asym_sess_info, &sess_info->session_id);
 | 
						|
        break;
 | 
						|
 | 
						|
    default:
 | 
						|
        ret = -VIRTIO_CRYPTO_NOTSUPP;
 | 
						|
        error_report("Unsupported opcode: %" PRIu32 "",
 | 
						|
                     sess_info->op_code);
 | 
						|
        break;
 | 
						|
    }
 | 
						|
    if (cb) {
 | 
						|
        cb(opaque, ret);
 | 
						|
    }
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int cryptodev_lkcf_close_session(CryptoDevBackend *backend,
 | 
						|
                                        uint64_t session_id,
 | 
						|
                                        uint32_t queue_index,
 | 
						|
                                        CryptoDevCompletionFunc cb,
 | 
						|
                                        void *opaque)
 | 
						|
{
 | 
						|
    CryptoDevBackendLKCF *lkcf = CRYPTODEV_BACKEND_LKCF(backend);
 | 
						|
    CryptoDevBackendLKCFSession *session;
 | 
						|
 | 
						|
    assert(session_id < MAX_SESSIONS && lkcf->sess[session_id]);
 | 
						|
    session = lkcf->sess[session_id];
 | 
						|
    lkcf->sess[session_id] = NULL;
 | 
						|
 | 
						|
    g_free(session->key);
 | 
						|
    g_free(session);
 | 
						|
 | 
						|
    if (cb) {
 | 
						|
        cb(opaque, VIRTIO_CRYPTO_OK);
 | 
						|
    }
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
static void cryptodev_lkcf_class_init(ObjectClass *oc, void *data)
 | 
						|
{
 | 
						|
    CryptoDevBackendClass *bc = CRYPTODEV_BACKEND_CLASS(oc);
 | 
						|
 | 
						|
    bc->init = cryptodev_lkcf_init;
 | 
						|
    bc->cleanup = cryptodev_lkcf_cleanup;
 | 
						|
    bc->create_session = cryptodev_lkcf_create_session;
 | 
						|
    bc->close_session = cryptodev_lkcf_close_session;
 | 
						|
    bc->do_op = cryptodev_lkcf_operation;
 | 
						|
}
 | 
						|
 | 
						|
static const TypeInfo cryptodev_builtin_info = {
 | 
						|
    .name = TYPE_CRYPTODEV_BACKEND_LKCF,
 | 
						|
    .parent = TYPE_CRYPTODEV_BACKEND,
 | 
						|
    .class_init = cryptodev_lkcf_class_init,
 | 
						|
    .instance_size = sizeof(CryptoDevBackendLKCF),
 | 
						|
};
 | 
						|
 | 
						|
static void cryptodev_lkcf_register_types(void)
 | 
						|
{
 | 
						|
    type_register_static(&cryptodev_builtin_info);
 | 
						|
}
 | 
						|
 | 
						|
type_init(cryptodev_lkcf_register_types);
 |