Commit e2950bf1 authored by Herbert Xu's avatar Herbert Xu

crypto: kpp - Count error stats differently

Move all stat code specific to kpp into the kpp code.

While we're at it, change the stats so that bytes and counts
are always incremented even in case of error.  This allows the
reference counting to be removed as we can now increment the
counters prior to the operation.

After the operation we simply increase the error count if necessary.
This is safe as errors can only occur synchronously (or rather,
the existing code already ignored asynchronous errors which are
only visible to the callback function).
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
parent 0a742389
...@@ -1051,36 +1051,6 @@ void crypto_stats_get(struct crypto_alg *alg) ...@@ -1051,36 +1051,6 @@ void crypto_stats_get(struct crypto_alg *alg)
} }
EXPORT_SYMBOL_GPL(crypto_stats_get); EXPORT_SYMBOL_GPL(crypto_stats_get);
void crypto_stats_kpp_set_secret(struct crypto_alg *alg, int ret)
{
if (ret)
atomic64_inc(&alg->stats.kpp.err_cnt);
else
atomic64_inc(&alg->stats.kpp.setsecret_cnt);
crypto_alg_put(alg);
}
EXPORT_SYMBOL_GPL(crypto_stats_kpp_set_secret);
void crypto_stats_kpp_generate_public_key(struct crypto_alg *alg, int ret)
{
if (ret)
atomic64_inc(&alg->stats.kpp.err_cnt);
else
atomic64_inc(&alg->stats.kpp.generate_public_key_cnt);
crypto_alg_put(alg);
}
EXPORT_SYMBOL_GPL(crypto_stats_kpp_generate_public_key);
void crypto_stats_kpp_compute_shared_secret(struct crypto_alg *alg, int ret)
{
if (ret)
atomic64_inc(&alg->stats.kpp.err_cnt);
else
atomic64_inc(&alg->stats.kpp.compute_shared_secret_cnt);
crypto_alg_put(alg);
}
EXPORT_SYMBOL_GPL(crypto_stats_kpp_compute_shared_secret);
void crypto_stats_rng_seed(struct crypto_alg *alg, int ret) void crypto_stats_rng_seed(struct crypto_alg *alg, int ret)
{ {
if (ret && ret != -EINPROGRESS && ret != -EBUSY) if (ret && ret != -EINPROGRESS && ret != -EBUSY)
......
...@@ -13,7 +13,6 @@ ...@@ -13,7 +13,6 @@
#include <net/sock.h> #include <net/sock.h>
#include <crypto/internal/skcipher.h> #include <crypto/internal/skcipher.h>
#include <crypto/internal/rng.h> #include <crypto/internal/rng.h>
#include <crypto/kpp.h>
#include <crypto/internal/cryptouser.h> #include <crypto/internal/cryptouser.h>
#include "internal.h" #include "internal.h"
...@@ -55,22 +54,6 @@ static int crypto_report_comp(struct sk_buff *skb, struct crypto_alg *alg) ...@@ -55,22 +54,6 @@ static int crypto_report_comp(struct sk_buff *skb, struct crypto_alg *alg)
return nla_put(skb, CRYPTOCFGA_STAT_COMPRESS, sizeof(rcomp), &rcomp); return nla_put(skb, CRYPTOCFGA_STAT_COMPRESS, sizeof(rcomp), &rcomp);
} }
static int crypto_report_kpp(struct sk_buff *skb, struct crypto_alg *alg)
{
struct crypto_stat_kpp rkpp;
memset(&rkpp, 0, sizeof(rkpp));
strscpy(rkpp.type, "kpp", sizeof(rkpp.type));
rkpp.stat_setsecret_cnt = atomic64_read(&alg->stats.kpp.setsecret_cnt);
rkpp.stat_generate_public_key_cnt = atomic64_read(&alg->stats.kpp.generate_public_key_cnt);
rkpp.stat_compute_shared_secret_cnt = atomic64_read(&alg->stats.kpp.compute_shared_secret_cnt);
rkpp.stat_err_cnt = atomic64_read(&alg->stats.kpp.err_cnt);
return nla_put(skb, CRYPTOCFGA_STAT_KPP, sizeof(rkpp), &rkpp);
}
static int crypto_report_rng(struct sk_buff *skb, struct crypto_alg *alg) static int crypto_report_rng(struct sk_buff *skb, struct crypto_alg *alg)
{ {
struct crypto_stat_rng rrng; struct crypto_stat_rng rrng;
...@@ -135,10 +118,6 @@ static int crypto_reportstat_one(struct crypto_alg *alg, ...@@ -135,10 +118,6 @@ static int crypto_reportstat_one(struct crypto_alg *alg,
if (crypto_report_comp(skb, alg)) if (crypto_report_comp(skb, alg))
goto nla_put_failure; goto nla_put_failure;
break; break;
case CRYPTO_ALG_TYPE_KPP:
if (crypto_report_kpp(skb, alg))
goto nla_put_failure;
break;
case CRYPTO_ALG_TYPE_RNG: case CRYPTO_ALG_TYPE_RNG:
if (crypto_report_rng(skb, alg)) if (crypto_report_rng(skb, alg))
goto nla_put_failure; goto nla_put_failure;
......
...@@ -5,19 +5,16 @@ ...@@ -5,19 +5,16 @@
* Copyright (c) 2016, Intel Corporation * Copyright (c) 2016, Intel Corporation
* Authors: Salvatore Benedetto <salvatore.benedetto@intel.com> * Authors: Salvatore Benedetto <salvatore.benedetto@intel.com>
*/ */
#include <crypto/internal/kpp.h>
#include <linux/cryptouser.h>
#include <linux/errno.h> #include <linux/errno.h>
#include <linux/kernel.h> #include <linux/kernel.h>
#include <linux/module.h> #include <linux/module.h>
#include <linux/seq_file.h> #include <linux/seq_file.h>
#include <linux/slab.h>
#include <linux/string.h> #include <linux/string.h>
#include <linux/crypto.h>
#include <crypto/algapi.h>
#include <linux/cryptouser.h>
#include <linux/compiler.h>
#include <net/netlink.h> #include <net/netlink.h>
#include <crypto/kpp.h>
#include <crypto/internal/kpp.h>
#include "internal.h" #include "internal.h"
#ifdef CONFIG_NET #ifdef CONFIG_NET
...@@ -75,6 +72,29 @@ static void crypto_kpp_free_instance(struct crypto_instance *inst) ...@@ -75,6 +72,29 @@ static void crypto_kpp_free_instance(struct crypto_instance *inst)
kpp->free(kpp); kpp->free(kpp);
} }
static int __maybe_unused crypto_kpp_report_stat(
struct sk_buff *skb, struct crypto_alg *alg)
{
struct kpp_alg *kpp = __crypto_kpp_alg(alg);
struct crypto_istat_kpp *istat;
struct crypto_stat_kpp rkpp;
istat = kpp_get_stat(kpp);
memset(&rkpp, 0, sizeof(rkpp));
strscpy(rkpp.type, "kpp", sizeof(rkpp.type));
rkpp.stat_setsecret_cnt = atomic64_read(&istat->setsecret_cnt);
rkpp.stat_generate_public_key_cnt =
atomic64_read(&istat->generate_public_key_cnt);
rkpp.stat_compute_shared_secret_cnt =
atomic64_read(&istat->compute_shared_secret_cnt);
rkpp.stat_err_cnt = atomic64_read(&istat->err_cnt);
return nla_put(skb, CRYPTOCFGA_STAT_KPP, sizeof(rkpp), &rkpp);
}
static const struct crypto_type crypto_kpp_type = { static const struct crypto_type crypto_kpp_type = {
.extsize = crypto_alg_extsize, .extsize = crypto_alg_extsize,
.init_tfm = crypto_kpp_init_tfm, .init_tfm = crypto_kpp_init_tfm,
...@@ -83,6 +103,9 @@ static const struct crypto_type crypto_kpp_type = { ...@@ -83,6 +103,9 @@ static const struct crypto_type crypto_kpp_type = {
.show = crypto_kpp_show, .show = crypto_kpp_show,
#endif #endif
.report = crypto_kpp_report, .report = crypto_kpp_report,
#ifdef CONFIG_CRYPTO_STATS
.report_stat = crypto_kpp_report_stat,
#endif
.maskclear = ~CRYPTO_ALG_TYPE_MASK, .maskclear = ~CRYPTO_ALG_TYPE_MASK,
.maskset = CRYPTO_ALG_TYPE_MASK, .maskset = CRYPTO_ALG_TYPE_MASK,
.type = CRYPTO_ALG_TYPE_KPP, .type = CRYPTO_ALG_TYPE_KPP,
...@@ -112,11 +135,15 @@ EXPORT_SYMBOL_GPL(crypto_has_kpp); ...@@ -112,11 +135,15 @@ EXPORT_SYMBOL_GPL(crypto_has_kpp);
static void kpp_prepare_alg(struct kpp_alg *alg) static void kpp_prepare_alg(struct kpp_alg *alg)
{ {
struct crypto_istat_kpp *istat = kpp_get_stat(alg);
struct crypto_alg *base = &alg->base; struct crypto_alg *base = &alg->base;
base->cra_type = &crypto_kpp_type; base->cra_type = &crypto_kpp_type;
base->cra_flags &= ~CRYPTO_ALG_TYPE_MASK; base->cra_flags &= ~CRYPTO_ALG_TYPE_MASK;
base->cra_flags |= CRYPTO_ALG_TYPE_KPP; base->cra_flags |= CRYPTO_ALG_TYPE_KPP;
if (IS_ENABLED(CONFIG_CRYPTO_STATS))
memset(istat, 0, sizeof(*istat));
} }
int crypto_register_kpp(struct kpp_alg *alg) int crypto_register_kpp(struct kpp_alg *alg)
......
...@@ -8,7 +8,11 @@ ...@@ -8,7 +8,11 @@
#ifndef _CRYPTO_KPP_ #ifndef _CRYPTO_KPP_
#define _CRYPTO_KPP_ #define _CRYPTO_KPP_
#include <linux/atomic.h>
#include <linux/container_of.h>
#include <linux/crypto.h> #include <linux/crypto.h>
#include <linux/slab.h>
/** /**
* struct kpp_request * struct kpp_request
...@@ -47,6 +51,20 @@ struct crypto_kpp { ...@@ -47,6 +51,20 @@ struct crypto_kpp {
struct crypto_tfm base; struct crypto_tfm base;
}; };
/*
* struct crypto_istat_kpp - statistics for KPP algorithm
* @setsecret_cnt: number of setsecrey operation
* @generate_public_key_cnt: number of generate_public_key operation
* @compute_shared_secret_cnt: number of compute_shared_secret operation
* @err_cnt: number of error for KPP requests
*/
struct crypto_istat_kpp {
atomic64_t setsecret_cnt;
atomic64_t generate_public_key_cnt;
atomic64_t compute_shared_secret_cnt;
atomic64_t err_cnt;
};
/** /**
* struct kpp_alg - generic key-agreement protocol primitives * struct kpp_alg - generic key-agreement protocol primitives
* *
...@@ -69,6 +87,7 @@ struct crypto_kpp { ...@@ -69,6 +87,7 @@ struct crypto_kpp {
* @exit: Undo everything @init did. * @exit: Undo everything @init did.
* *
* @base: Common crypto API algorithm data structure * @base: Common crypto API algorithm data structure
* @stat: Statistics for KPP algorithm
*/ */
struct kpp_alg { struct kpp_alg {
int (*set_secret)(struct crypto_kpp *tfm, const void *buffer, int (*set_secret)(struct crypto_kpp *tfm, const void *buffer,
...@@ -81,6 +100,10 @@ struct kpp_alg { ...@@ -81,6 +100,10 @@ struct kpp_alg {
int (*init)(struct crypto_kpp *tfm); int (*init)(struct crypto_kpp *tfm);
void (*exit)(struct crypto_kpp *tfm); void (*exit)(struct crypto_kpp *tfm);
#ifdef CONFIG_CRYPTO_STATS
struct crypto_istat_kpp stat;
#endif
struct crypto_alg base; struct crypto_alg base;
}; };
...@@ -268,6 +291,26 @@ struct kpp_secret { ...@@ -268,6 +291,26 @@ struct kpp_secret {
unsigned short len; unsigned short len;
}; };
static inline struct crypto_istat_kpp *kpp_get_stat(struct kpp_alg *alg)
{
#ifdef CONFIG_CRYPTO_STATS
return &alg->stat;
#else
return NULL;
#endif
}
static inline int crypto_kpp_errstat(struct kpp_alg *alg, int err)
{
if (!IS_ENABLED(CONFIG_CRYPTO_STATS))
return err;
if (err && err != -EINPROGRESS && err != -EBUSY)
atomic64_inc(&kpp_get_stat(alg)->err_cnt);
return err;
}
/** /**
* crypto_kpp_set_secret() - Invoke kpp operation * crypto_kpp_set_secret() - Invoke kpp operation
* *
...@@ -287,13 +330,11 @@ static inline int crypto_kpp_set_secret(struct crypto_kpp *tfm, ...@@ -287,13 +330,11 @@ static inline int crypto_kpp_set_secret(struct crypto_kpp *tfm,
const void *buffer, unsigned int len) const void *buffer, unsigned int len)
{ {
struct kpp_alg *alg = crypto_kpp_alg(tfm); struct kpp_alg *alg = crypto_kpp_alg(tfm);
struct crypto_alg *calg = tfm->base.__crt_alg;
int ret;
crypto_stats_get(calg); if (IS_ENABLED(CONFIG_CRYPTO_STATS))
ret = alg->set_secret(tfm, buffer, len); atomic64_inc(&kpp_get_stat(alg)->setsecret_cnt);
crypto_stats_kpp_set_secret(calg, ret);
return ret; return crypto_kpp_errstat(alg, alg->set_secret(tfm, buffer, len));
} }
/** /**
...@@ -313,13 +354,11 @@ static inline int crypto_kpp_generate_public_key(struct kpp_request *req) ...@@ -313,13 +354,11 @@ static inline int crypto_kpp_generate_public_key(struct kpp_request *req)
{ {
struct crypto_kpp *tfm = crypto_kpp_reqtfm(req); struct crypto_kpp *tfm = crypto_kpp_reqtfm(req);
struct kpp_alg *alg = crypto_kpp_alg(tfm); struct kpp_alg *alg = crypto_kpp_alg(tfm);
struct crypto_alg *calg = tfm->base.__crt_alg;
int ret;
crypto_stats_get(calg); if (IS_ENABLED(CONFIG_CRYPTO_STATS))
ret = alg->generate_public_key(req); atomic64_inc(&kpp_get_stat(alg)->generate_public_key_cnt);
crypto_stats_kpp_generate_public_key(calg, ret);
return ret; return crypto_kpp_errstat(alg, alg->generate_public_key(req));
} }
/** /**
...@@ -336,13 +375,11 @@ static inline int crypto_kpp_compute_shared_secret(struct kpp_request *req) ...@@ -336,13 +375,11 @@ static inline int crypto_kpp_compute_shared_secret(struct kpp_request *req)
{ {
struct crypto_kpp *tfm = crypto_kpp_reqtfm(req); struct crypto_kpp *tfm = crypto_kpp_reqtfm(req);
struct kpp_alg *alg = crypto_kpp_alg(tfm); struct kpp_alg *alg = crypto_kpp_alg(tfm);
struct crypto_alg *calg = tfm->base.__crt_alg;
int ret;
crypto_stats_get(calg); if (IS_ENABLED(CONFIG_CRYPTO_STATS))
ret = alg->compute_shared_secret(req); atomic64_inc(&kpp_get_stat(alg)->compute_shared_secret_cnt);
crypto_stats_kpp_compute_shared_secret(calg, ret);
return ret; return crypto_kpp_errstat(alg, alg->compute_shared_secret(req));
} }
/** /**
......
...@@ -292,20 +292,6 @@ struct crypto_istat_cipher { ...@@ -292,20 +292,6 @@ struct crypto_istat_cipher {
atomic64_t err_cnt; atomic64_t err_cnt;
}; };
/*
* struct crypto_istat_kpp - statistics for KPP algorithm
* @setsecret_cnt: number of setsecrey operation
* @generate_public_key_cnt: number of generate_public_key operation
* @compute_shared_secret_cnt: number of compute_shared_secret operation
* @err_cnt: number of error for KPP requests
*/
struct crypto_istat_kpp {
atomic64_t setsecret_cnt;
atomic64_t generate_public_key_cnt;
atomic64_t compute_shared_secret_cnt;
atomic64_t err_cnt;
};
/* /*
* struct crypto_istat_rng: statistics for RNG algorithm * struct crypto_istat_rng: statistics for RNG algorithm
* @generate_cnt: number of RNG generate requests * @generate_cnt: number of RNG generate requests
...@@ -401,7 +387,6 @@ struct crypto_istat_rng { ...@@ -401,7 +387,6 @@ struct crypto_istat_rng {
* @stats: union of all possible crypto_istat_xxx structures * @stats: union of all possible crypto_istat_xxx structures
* @stats.cipher: statistics for cipher algorithm * @stats.cipher: statistics for cipher algorithm
* @stats.rng: statistics for rng algorithm * @stats.rng: statistics for rng algorithm
* @stats.kpp: statistics for KPP algorithm
* *
* The struct crypto_alg describes a generic Crypto API algorithm and is common * The struct crypto_alg describes a generic Crypto API algorithm and is common
* for all of the transformations. Any variable not documented here shall not * for all of the transformations. Any variable not documented here shall not
...@@ -439,7 +424,6 @@ struct crypto_alg { ...@@ -439,7 +424,6 @@ struct crypto_alg {
union { union {
struct crypto_istat_cipher cipher; struct crypto_istat_cipher cipher;
struct crypto_istat_rng rng; struct crypto_istat_rng rng;
struct crypto_istat_kpp kpp;
} stats; } stats;
#endif /* CONFIG_CRYPTO_STATS */ #endif /* CONFIG_CRYPTO_STATS */
...@@ -448,9 +432,6 @@ struct crypto_alg { ...@@ -448,9 +432,6 @@ struct crypto_alg {
#ifdef CONFIG_CRYPTO_STATS #ifdef CONFIG_CRYPTO_STATS
void crypto_stats_init(struct crypto_alg *alg); void crypto_stats_init(struct crypto_alg *alg);
void crypto_stats_get(struct crypto_alg *alg); void crypto_stats_get(struct crypto_alg *alg);
void crypto_stats_kpp_set_secret(struct crypto_alg *alg, int ret);
void crypto_stats_kpp_generate_public_key(struct crypto_alg *alg, int ret);
void crypto_stats_kpp_compute_shared_secret(struct crypto_alg *alg, int ret);
void crypto_stats_rng_seed(struct crypto_alg *alg, int ret); void crypto_stats_rng_seed(struct crypto_alg *alg, int ret);
void crypto_stats_rng_generate(struct crypto_alg *alg, unsigned int dlen, int ret); void crypto_stats_rng_generate(struct crypto_alg *alg, unsigned int dlen, int ret);
void crypto_stats_skcipher_encrypt(unsigned int cryptlen, int ret, struct crypto_alg *alg); void crypto_stats_skcipher_encrypt(unsigned int cryptlen, int ret, struct crypto_alg *alg);
...@@ -460,12 +441,6 @@ static inline void crypto_stats_init(struct crypto_alg *alg) ...@@ -460,12 +441,6 @@ static inline void crypto_stats_init(struct crypto_alg *alg)
{} {}
static inline void crypto_stats_get(struct crypto_alg *alg) static inline void crypto_stats_get(struct crypto_alg *alg)
{} {}
static inline void crypto_stats_kpp_set_secret(struct crypto_alg *alg, int ret)
{}
static inline void crypto_stats_kpp_generate_public_key(struct crypto_alg *alg, int ret)
{}
static inline void crypto_stats_kpp_compute_shared_secret(struct crypto_alg *alg, int ret)
{}
static inline void crypto_stats_rng_seed(struct crypto_alg *alg, int ret) static inline void crypto_stats_rng_seed(struct crypto_alg *alg, int ret)
{} {}
static inline void crypto_stats_rng_generate(struct crypto_alg *alg, unsigned int dlen, int ret) static inline void crypto_stats_rng_generate(struct crypto_alg *alg, unsigned int dlen, int ret)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment