Skip to content

Commit 2beb81f

Browse files
ebiggersherbertx
authored andcommitted
crypto: remove CONFIG_CRYPTO_STATS
Remove support for the "Crypto usage statistics" feature (CONFIG_CRYPTO_STATS). This feature does not appear to have ever been used, and it is harmful because it significantly reduces performance and is a large maintenance burden. Covering each of these points in detail: 1. Feature is not being used Since these generic crypto statistics are only readable using netlink, it's fairly straightforward to look for programs that use them. I'm unable to find any evidence that any such programs exist. For example, Debian Code Search returns no hits except the kernel header and kernel code itself and translations of the kernel header: https://codesearch.debian.net/search?q=CRYPTOCFGA_STAT&literal=1&perpkg=1 The patch series that added this feature in 2018 (https://lore.kernel.org/linux-crypto/1537351855-16618-1-git-send-email-clabbe@baylibre.com/) said "The goal is to have an ifconfig for crypto device." This doesn't appear to have happened. It's not clear that there is real demand for crypto statistics. Just because the kernel provides other types of statistics such as I/O and networking statistics and some people find those useful does not mean that crypto statistics are useful too. Further evidence that programs are not using CONFIG_CRYPTO_STATS is that it was able to be disabled in RHEL and Fedora as a bug fix (https://gitlab.com/redhat/centos-stream/src/kernel/centos-stream-9/-/merge_requests/2947). Even further evidence comes from the fact that there are and have been bugs in how the stats work, but they were never reported. For example, before Linux v6.7 hash stats were double-counted in most cases. There has also never been any documentation for this feature, so it might be hard to use even if someone wanted to. 2. CONFIG_CRYPTO_STATS significantly reduces performance Enabling CONFIG_CRYPTO_STATS significantly reduces the performance of the crypto API, even if no program ever retrieves the statistics. This primarily affects systems with large number of CPUs. For example, https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2039576 reported that Lustre client encryption performance improved from 21.7GB/s to 48.2GB/s by disabling CONFIG_CRYPTO_STATS. It can be argued that this means that CONFIG_CRYPTO_STATS should be optimized with per-cpu counters similar to many of the networking counters. But no one has done this in 5+ years. This is consistent with the fact that the feature appears to be unused, so there seems to be little interest in improving it as opposed to just disabling it. It can be argued that because CONFIG_CRYPTO_STATS is off by default, performance doesn't matter. But Linux distros tend to error on the side of enabling options. The option is enabled in Ubuntu and Arch Linux, and until recently was enabled in RHEL and Fedora (see above). So, even just having the option available is harmful to users. 3. CONFIG_CRYPTO_STATS is a large maintenance burden There are over 1000 lines of code associated with CONFIG_CRYPTO_STATS, spread among 32 files. It significantly complicates much of the implementation of the crypto API. After the initial submission, many fixes and refactorings have consumed effort of multiple people to keep this feature "working". We should be spending this effort elsewhere. Cc: Corentin Labbe <clabbe@baylibre.com> Signed-off-by: Eric Biggers <ebiggers@google.com> Acked-by: Ard Biesheuvel <ardb@kernel.org> Acked-by: Corentin Labbe <clabbe@baylibre.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
1 parent f66a211 commit 2beb81f

32 files changed

+77
-1139
lines changed

arch/s390/configs/debug_defconfig

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -766,7 +766,6 @@ CONFIG_CRYPTO_USER_API_HASH=m
766766
CONFIG_CRYPTO_USER_API_SKCIPHER=m
767767
CONFIG_CRYPTO_USER_API_RNG=m
768768
CONFIG_CRYPTO_USER_API_AEAD=m
769-
CONFIG_CRYPTO_STATS=y
770769
CONFIG_CRYPTO_CRC32_S390=y
771770
CONFIG_CRYPTO_SHA512_S390=m
772771
CONFIG_CRYPTO_SHA1_S390=m

arch/s390/configs/defconfig

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -752,7 +752,6 @@ CONFIG_CRYPTO_USER_API_HASH=m
752752
CONFIG_CRYPTO_USER_API_SKCIPHER=m
753753
CONFIG_CRYPTO_USER_API_RNG=m
754754
CONFIG_CRYPTO_USER_API_AEAD=m
755-
CONFIG_CRYPTO_STATS=y
756755
CONFIG_CRYPTO_CRC32_S390=y
757756
CONFIG_CRYPTO_SHA512_S390=m
758757
CONFIG_CRYPTO_SHA1_S390=m

crypto/Kconfig

Lines changed: 0 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1456,26 +1456,6 @@ config CRYPTO_USER_API_ENABLE_OBSOLETE
14561456
already been phased out from internal use by the kernel, and are
14571457
only useful for userspace clients that still rely on them.
14581458

1459-
config CRYPTO_STATS
1460-
bool "Crypto usage statistics"
1461-
depends on CRYPTO_USER
1462-
help
1463-
Enable the gathering of crypto stats.
1464-
1465-
Enabling this option reduces the performance of the crypto API. It
1466-
should only be enabled when there is actually a use case for it.
1467-
1468-
This collects data sizes, numbers of requests, and numbers
1469-
of errors processed by:
1470-
- AEAD ciphers (encrypt, decrypt)
1471-
- asymmetric key ciphers (encrypt, decrypt, verify, sign)
1472-
- symmetric key ciphers (encrypt, decrypt)
1473-
- compression algorithms (compress, decompress)
1474-
- hash algorithms (hash)
1475-
- key-agreement protocol primitives (setsecret, generate
1476-
public key, compute shared secret)
1477-
- RNG (generate, seed)
1478-
14791459
endmenu
14801460

14811461
config CRYPTO_HASH_INFO

crypto/Makefile

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,8 +69,6 @@ cryptomgr-y := algboss.o testmgr.o
6969

7070
obj-$(CONFIG_CRYPTO_MANAGER2) += cryptomgr.o
7171
obj-$(CONFIG_CRYPTO_USER) += crypto_user.o
72-
crypto_user-y := crypto_user_base.o
73-
crypto_user-$(CONFIG_CRYPTO_STATS) += crypto_user_stat.o
7472
obj-$(CONFIG_CRYPTO_CMAC) += cmac.o
7573
obj-$(CONFIG_CRYPTO_HMAC) += hmac.o
7674
obj-$(CONFIG_CRYPTO_VMAC) += vmac.o

crypto/acompress.c

Lines changed: 3 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ static const struct crypto_type crypto_acomp_type;
2525

2626
static inline struct acomp_alg *__crypto_acomp_alg(struct crypto_alg *alg)
2727
{
28-
return container_of(alg, struct acomp_alg, calg.base);
28+
return container_of(alg, struct acomp_alg, base);
2929
}
3030

3131
static inline struct acomp_alg *crypto_acomp_alg(struct crypto_acomp *tfm)
@@ -93,32 +93,6 @@ static unsigned int crypto_acomp_extsize(struct crypto_alg *alg)
9393
return extsize;
9494
}
9595

96-
static inline int __crypto_acomp_report_stat(struct sk_buff *skb,
97-
struct crypto_alg *alg)
98-
{
99-
struct comp_alg_common *calg = __crypto_comp_alg_common(alg);
100-
struct crypto_istat_compress *istat = comp_get_stat(calg);
101-
struct crypto_stat_compress racomp;
102-
103-
memset(&racomp, 0, sizeof(racomp));
104-
105-
strscpy(racomp.type, "acomp", sizeof(racomp.type));
106-
racomp.stat_compress_cnt = atomic64_read(&istat->compress_cnt);
107-
racomp.stat_compress_tlen = atomic64_read(&istat->compress_tlen);
108-
racomp.stat_decompress_cnt = atomic64_read(&istat->decompress_cnt);
109-
racomp.stat_decompress_tlen = atomic64_read(&istat->decompress_tlen);
110-
racomp.stat_err_cnt = atomic64_read(&istat->err_cnt);
111-
112-
return nla_put(skb, CRYPTOCFGA_STAT_ACOMP, sizeof(racomp), &racomp);
113-
}
114-
115-
#ifdef CONFIG_CRYPTO_STATS
116-
int crypto_acomp_report_stat(struct sk_buff *skb, struct crypto_alg *alg)
117-
{
118-
return __crypto_acomp_report_stat(skb, alg);
119-
}
120-
#endif
121-
12296
static const struct crypto_type crypto_acomp_type = {
12397
.extsize = crypto_acomp_extsize,
12498
.init_tfm = crypto_acomp_init_tfm,
@@ -127,9 +101,6 @@ static const struct crypto_type crypto_acomp_type = {
127101
#endif
128102
#if IS_ENABLED(CONFIG_CRYPTO_USER)
129103
.report = crypto_acomp_report,
130-
#endif
131-
#ifdef CONFIG_CRYPTO_STATS
132-
.report_stat = crypto_acomp_report_stat,
133104
#endif
134105
.maskclear = ~CRYPTO_ALG_TYPE_MASK,
135106
.maskset = CRYPTO_ALG_TYPE_ACOMPRESS_MASK,
@@ -182,24 +153,12 @@ void acomp_request_free(struct acomp_req *req)
182153
}
183154
EXPORT_SYMBOL_GPL(acomp_request_free);
184155

185-
void comp_prepare_alg(struct comp_alg_common *alg)
186-
{
187-
struct crypto_istat_compress *istat = comp_get_stat(alg);
188-
struct crypto_alg *base = &alg->base;
189-
190-
base->cra_flags &= ~CRYPTO_ALG_TYPE_MASK;
191-
192-
if (IS_ENABLED(CONFIG_CRYPTO_STATS))
193-
memset(istat, 0, sizeof(*istat));
194-
}
195-
196156
int crypto_register_acomp(struct acomp_alg *alg)
197157
{
198-
struct crypto_alg *base = &alg->calg.base;
199-
200-
comp_prepare_alg(&alg->calg);
158+
struct crypto_alg *base = &alg->base;
201159

202160
base->cra_type = &crypto_acomp_type;
161+
base->cra_flags &= ~CRYPTO_ALG_TYPE_MASK;
203162
base->cra_flags |= CRYPTO_ALG_TYPE_ACOMPRESS;
204163

205164
return crypto_register_alg(base);

crypto/aead.c

Lines changed: 7 additions & 77 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,6 @@
2020

2121
#include "internal.h"
2222

23-
static inline struct crypto_istat_aead *aead_get_stat(struct aead_alg *alg)
24-
{
25-
#ifdef CONFIG_CRYPTO_STATS
26-
return &alg->stat;
27-
#else
28-
return NULL;
29-
#endif
30-
}
31-
3223
static int setkey_unaligned(struct crypto_aead *tfm, const u8 *key,
3324
unsigned int keylen)
3425
{
@@ -90,62 +81,28 @@ int crypto_aead_setauthsize(struct crypto_aead *tfm, unsigned int authsize)
9081
}
9182
EXPORT_SYMBOL_GPL(crypto_aead_setauthsize);
9283

93-
static inline int crypto_aead_errstat(struct crypto_istat_aead *istat, int err)
94-
{
95-
if (!IS_ENABLED(CONFIG_CRYPTO_STATS))
96-
return err;
97-
98-
if (err && err != -EINPROGRESS && err != -EBUSY)
99-
atomic64_inc(&istat->err_cnt);
100-
101-
return err;
102-
}
103-
10484
int crypto_aead_encrypt(struct aead_request *req)
10585
{
10686
struct crypto_aead *aead = crypto_aead_reqtfm(req);
107-
struct aead_alg *alg = crypto_aead_alg(aead);
108-
struct crypto_istat_aead *istat;
109-
int ret;
110-
111-
istat = aead_get_stat(alg);
112-
113-
if (IS_ENABLED(CONFIG_CRYPTO_STATS)) {
114-
atomic64_inc(&istat->encrypt_cnt);
115-
atomic64_add(req->cryptlen, &istat->encrypt_tlen);
116-
}
11787

11888
if (crypto_aead_get_flags(aead) & CRYPTO_TFM_NEED_KEY)
119-
ret = -ENOKEY;
120-
else
121-
ret = alg->encrypt(req);
89+
return -ENOKEY;
12290

123-
return crypto_aead_errstat(istat, ret);
91+
return crypto_aead_alg(aead)->encrypt(req);
12492
}
12593
EXPORT_SYMBOL_GPL(crypto_aead_encrypt);
12694

12795
int crypto_aead_decrypt(struct aead_request *req)
12896
{
12997
struct crypto_aead *aead = crypto_aead_reqtfm(req);
130-
struct aead_alg *alg = crypto_aead_alg(aead);
131-
struct crypto_istat_aead *istat;
132-
int ret;
133-
134-
istat = aead_get_stat(alg);
135-
136-
if (IS_ENABLED(CONFIG_CRYPTO_STATS)) {
137-
atomic64_inc(&istat->encrypt_cnt);
138-
atomic64_add(req->cryptlen, &istat->encrypt_tlen);
139-
}
14098

14199
if (crypto_aead_get_flags(aead) & CRYPTO_TFM_NEED_KEY)
142-
ret = -ENOKEY;
143-
else if (req->cryptlen < crypto_aead_authsize(aead))
144-
ret = -EINVAL;
145-
else
146-
ret = alg->decrypt(req);
100+
return -ENOKEY;
101+
102+
if (req->cryptlen < crypto_aead_authsize(aead))
103+
return -EINVAL;
147104

148-
return crypto_aead_errstat(istat, ret);
105+
return crypto_aead_alg(aead)->decrypt(req);
149106
}
150107
EXPORT_SYMBOL_GPL(crypto_aead_decrypt);
151108

@@ -215,26 +172,6 @@ static void crypto_aead_free_instance(struct crypto_instance *inst)
215172
aead->free(aead);
216173
}
217174

218-
static int __maybe_unused crypto_aead_report_stat(
219-
struct sk_buff *skb, struct crypto_alg *alg)
220-
{
221-
struct aead_alg *aead = container_of(alg, struct aead_alg, base);
222-
struct crypto_istat_aead *istat = aead_get_stat(aead);
223-
struct crypto_stat_aead raead;
224-
225-
memset(&raead, 0, sizeof(raead));
226-
227-
strscpy(raead.type, "aead", sizeof(raead.type));
228-
229-
raead.stat_encrypt_cnt = atomic64_read(&istat->encrypt_cnt);
230-
raead.stat_encrypt_tlen = atomic64_read(&istat->encrypt_tlen);
231-
raead.stat_decrypt_cnt = atomic64_read(&istat->decrypt_cnt);
232-
raead.stat_decrypt_tlen = atomic64_read(&istat->decrypt_tlen);
233-
raead.stat_err_cnt = atomic64_read(&istat->err_cnt);
234-
235-
return nla_put(skb, CRYPTOCFGA_STAT_AEAD, sizeof(raead), &raead);
236-
}
237-
238175
static const struct crypto_type crypto_aead_type = {
239176
.extsize = crypto_alg_extsize,
240177
.init_tfm = crypto_aead_init_tfm,
@@ -244,9 +181,6 @@ static const struct crypto_type crypto_aead_type = {
244181
#endif
245182
#if IS_ENABLED(CONFIG_CRYPTO_USER)
246183
.report = crypto_aead_report,
247-
#endif
248-
#ifdef CONFIG_CRYPTO_STATS
249-
.report_stat = crypto_aead_report_stat,
250184
#endif
251185
.maskclear = ~CRYPTO_ALG_TYPE_MASK,
252186
.maskset = CRYPTO_ALG_TYPE_MASK,
@@ -277,7 +211,6 @@ EXPORT_SYMBOL_GPL(crypto_has_aead);
277211

278212
static int aead_prepare_alg(struct aead_alg *alg)
279213
{
280-
struct crypto_istat_aead *istat = aead_get_stat(alg);
281214
struct crypto_alg *base = &alg->base;
282215

283216
if (max3(alg->maxauthsize, alg->ivsize, alg->chunksize) >
@@ -291,9 +224,6 @@ static int aead_prepare_alg(struct aead_alg *alg)
291224
base->cra_flags &= ~CRYPTO_ALG_TYPE_MASK;
292225
base->cra_flags |= CRYPTO_ALG_TYPE_AEAD;
293226

294-
if (IS_ENABLED(CONFIG_CRYPTO_STATS))
295-
memset(istat, 0, sizeof(*istat));
296-
297227
return 0;
298228
}
299229

crypto/ahash.c

Lines changed: 5 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -27,22 +27,6 @@
2727

2828
#define CRYPTO_ALG_TYPE_AHASH_MASK 0x0000000e
2929

30-
static inline struct crypto_istat_hash *ahash_get_stat(struct ahash_alg *alg)
31-
{
32-
return hash_get_stat(&alg->halg);
33-
}
34-
35-
static inline int crypto_ahash_errstat(struct ahash_alg *alg, int err)
36-
{
37-
if (!IS_ENABLED(CONFIG_CRYPTO_STATS))
38-
return err;
39-
40-
if (err && err != -EINPROGRESS && err != -EBUSY)
41-
atomic64_inc(&ahash_get_stat(alg)->err_cnt);
42-
43-
return err;
44-
}
45-
4630
/*
4731
* For an ahash tfm that is using an shash algorithm (instead of an ahash
4832
* algorithm), this returns the underlying shash tfm.
@@ -344,75 +328,47 @@ static void ahash_restore_req(struct ahash_request *req, int err)
344328
int crypto_ahash_update(struct ahash_request *req)
345329
{
346330
struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
347-
struct ahash_alg *alg;
348331

349332
if (likely(tfm->using_shash))
350333
return shash_ahash_update(req, ahash_request_ctx(req));
351334

352-
alg = crypto_ahash_alg(tfm);
353-
if (IS_ENABLED(CONFIG_CRYPTO_STATS))
354-
atomic64_add(req->nbytes, &ahash_get_stat(alg)->hash_tlen);
355-
return crypto_ahash_errstat(alg, alg->update(req));
335+
return crypto_ahash_alg(tfm)->update(req);
356336
}
357337
EXPORT_SYMBOL_GPL(crypto_ahash_update);
358338

359339
int crypto_ahash_final(struct ahash_request *req)
360340
{
361341
struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
362-
struct ahash_alg *alg;
363342

364343
if (likely(tfm->using_shash))
365344
return crypto_shash_final(ahash_request_ctx(req), req->result);
366345

367-
alg = crypto_ahash_alg(tfm);
368-
if (IS_ENABLED(CONFIG_CRYPTO_STATS))
369-
atomic64_inc(&ahash_get_stat(alg)->hash_cnt);
370-
return crypto_ahash_errstat(alg, alg->final(req));
346+
return crypto_ahash_alg(tfm)->final(req);
371347
}
372348
EXPORT_SYMBOL_GPL(crypto_ahash_final);
373349

374350
int crypto_ahash_finup(struct ahash_request *req)
375351
{
376352
struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
377-
struct ahash_alg *alg;
378353

379354
if (likely(tfm->using_shash))
380355
return shash_ahash_finup(req, ahash_request_ctx(req));
381356

382-
alg = crypto_ahash_alg(tfm);
383-
if (IS_ENABLED(CONFIG_CRYPTO_STATS)) {
384-
struct crypto_istat_hash *istat = ahash_get_stat(alg);
385-
386-
atomic64_inc(&istat->hash_cnt);
387-
atomic64_add(req->nbytes, &istat->hash_tlen);
388-
}
389-
return crypto_ahash_errstat(alg, alg->finup(req));
357+
return crypto_ahash_alg(tfm)->finup(req);
390358
}
391359
EXPORT_SYMBOL_GPL(crypto_ahash_finup);
392360

393361
int crypto_ahash_digest(struct ahash_request *req)
394362
{
395363
struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
396-
struct ahash_alg *alg;
397-
int err;
398364

399365
if (likely(tfm->using_shash))
400366
return shash_ahash_digest(req, prepare_shash_desc(req, tfm));
401367

402-
alg = crypto_ahash_alg(tfm);
403-
if (IS_ENABLED(CONFIG_CRYPTO_STATS)) {
404-
struct crypto_istat_hash *istat = ahash_get_stat(alg);
405-
406-
atomic64_inc(&istat->hash_cnt);
407-
atomic64_add(req->nbytes, &istat->hash_tlen);
408-
}
409-
410368
if (crypto_ahash_get_flags(tfm) & CRYPTO_TFM_NEED_KEY)
411-
err = -ENOKEY;
412-
else
413-
err = alg->digest(req);
369+
return -ENOKEY;
414370

415-
return crypto_ahash_errstat(alg, err);
371+
return crypto_ahash_alg(tfm)->digest(req);
416372
}
417373
EXPORT_SYMBOL_GPL(crypto_ahash_digest);
418374

@@ -571,12 +527,6 @@ static void crypto_ahash_show(struct seq_file *m, struct crypto_alg *alg)
571527
__crypto_hash_alg_common(alg)->digestsize);
572528
}
573529

574-
static int __maybe_unused crypto_ahash_report_stat(
575-
struct sk_buff *skb, struct crypto_alg *alg)
576-
{
577-
return crypto_hash_report_stat(skb, alg, "ahash");
578-
}
579-
580530
static const struct crypto_type crypto_ahash_type = {
581531
.extsize = crypto_ahash_extsize,
582532
.init_tfm = crypto_ahash_init_tfm,
@@ -586,9 +536,6 @@ static const struct crypto_type crypto_ahash_type = {
586536
#endif
587537
#if IS_ENABLED(CONFIG_CRYPTO_USER)
588538
.report = crypto_ahash_report,
589-
#endif
590-
#ifdef CONFIG_CRYPTO_STATS
591-
.report_stat = crypto_ahash_report_stat,
592539
#endif
593540
.maskclear = ~CRYPTO_ALG_TYPE_MASK,
594541
.maskset = CRYPTO_ALG_TYPE_AHASH_MASK,

0 commit comments

Comments
 (0)