Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1285490imu; Mon, 5 Nov 2018 17:44:41 -0800 (PST) X-Google-Smtp-Source: AJdET5eYf0ahg95jryuLkQe5Uy7LBPQX5Km+9vhdWKmIDOFc5JkDERPRyrA25AgmqJXTpeiB94MU X-Received: by 2002:a62:4b09:: with SMTP id y9-v6mr24393562pfa.93.1541468680957; Mon, 05 Nov 2018 17:44:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541468680; cv=none; d=google.com; s=arc-20160816; b=oXEXAVoK3g+gSOEWrqHxzOTJJEezhcYFfAVaCJMMmrGr63JZepAaZHYVndRP0Fsfic XGdm/oJHsgzmbY4d2EDxcRIpUVO2E31+NDiFTF8KFk3dw+zRxmUuIo+lSNlZ81HVemwx 1K1F79ZZRQ9i7Kd+mdqdXWchhLDDOLzBZ14tdbxBlh3T5VCwsgkQx5sIhVvZOpzKAE2E PF6z6lbKAcqrUUHzoHTP9mVsfukC4xWB+ZU3FnudvyUufuEE8TbTbb2A/5WOl9+M6skX Ewf4tUOvlLTamY8+RRm8WwXxQciJi7K6E596Kd9xqNft5URuIpAxzgYZjyh3QsYwfPsF 4Dpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=CsWsWK0ZobzN4m7X9Kz45kbO4bFTvGeVEiFEtlRm5G8=; b=weg48N8qnQoUHgJsm9q2YePlJZVFPuitg+HTAQjg2TnNT9BktnA3e/Wza3+NKitlVQ GkllrzKNlYl8iVJkB9Zms2T1xolMbqN8apfMfcltKhAyVpiSMr4Z2kQJ5dK2jl3FKHpb gJfKyvAatT9mQBsDruNOuhmt3AxelQfzLSqfjUvjYSRCIbKfuYa8aQncyyD1YMNrCwVZ areK731qc0Io1NIsa+j5FHnTjknv62LusiRHpU9HKyTonMSU9+jj1JaubVZu/9HrwsS0 5861oxMtHXAO52rA7Dcngfw9lyOwQBEpVl0B3gNyBQ+jGZHCoWuJGMcPSumfxlWhFYvl oLPw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ix2KHwqA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l14si8747826pgi.147.2018.11.05.17.44.24; Mon, 05 Nov 2018 17:44:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ix2KHwqA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729244AbeKFLFZ (ORCPT + 99 others); Tue, 6 Nov 2018 06:05:25 -0500 Received: from mail.kernel.org ([198.145.29.99]:54804 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726228AbeKFLFY (ORCPT ); Tue, 6 Nov 2018 06:05:24 -0500 Received: from gmail.com (unknown [104.132.51.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A7C9A2081D; Tue, 6 Nov 2018 01:42:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541468563; bh=r1uftKosZawVa4mSfsDYSC0QvHzk0AzL6IKIoEFesto=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ix2KHwqAZDLHUhotp2ZIdPtWnDI1SYJtYOMsfo/qP6waD+ElCYzMMz7Oz0R3K6kp/ hwyXdTwkkLRWwcHKmFrnvYDsMip+lxk9z7GyTUky7qA63Kx234sKD4aWyCmWZwGKfO gesUOg4Z5G5KP6gd/ptsIPbDvDmPMv32L9S/otfk= Date: Mon, 5 Nov 2018 17:42:42 -0800 From: Eric Biggers To: Corentin Labbe Cc: davem@davemloft.net, herbert@gondor.apana.org.au, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 2/5] crypto: crypto_user_stat: convert all stats from u32 to u64 Message-ID: <20181106014242.GD28490@gmail.com> References: <1541422274-40060-1-git-send-email-clabbe@baylibre.com> <1541422274-40060-3-git-send-email-clabbe@baylibre.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1541422274-40060-3-git-send-email-clabbe@baylibre.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Corentin, On Mon, Nov 05, 2018 at 12:51:11PM +0000, Corentin Labbe wrote: > All the 32-bit fields need to be 64-bit. In some cases, UINT32_MAX crypto > operations can be done in seconds. > > Reported-by: Eric Biggers > Signed-off-by: Corentin Labbe > --- > crypto/algapi.c | 10 +-- > crypto/crypto_user_stat.c | 114 +++++++++++++++----------------- > include/crypto/acompress.h | 8 +-- > include/crypto/aead.h | 8 +-- > include/crypto/akcipher.h | 16 ++--- > include/crypto/hash.h | 6 +- > include/crypto/kpp.h | 12 ++-- > include/crypto/rng.h | 8 +-- > include/crypto/skcipher.h | 8 +-- > include/linux/crypto.h | 46 ++++++------- > include/uapi/linux/cryptouser.h | 38 +++++------ > 11 files changed, 133 insertions(+), 141 deletions(-) > > diff --git a/crypto/algapi.c b/crypto/algapi.c > index f5396c88e8cd..42fe316f80ee 100644 > --- a/crypto/algapi.c > +++ b/crypto/algapi.c > @@ -259,13 +259,13 @@ static struct crypto_larval *__crypto_register_alg(struct crypto_alg *alg) > list_add(&larval->alg.cra_list, &crypto_alg_list); > > #ifdef CONFIG_CRYPTO_STATS > - atomic_set(&alg->encrypt_cnt, 0); > - atomic_set(&alg->decrypt_cnt, 0); > + atomic64_set(&alg->encrypt_cnt, 0); > + atomic64_set(&alg->decrypt_cnt, 0); > atomic64_set(&alg->encrypt_tlen, 0); > atomic64_set(&alg->decrypt_tlen, 0); > - atomic_set(&alg->verify_cnt, 0); > - atomic_set(&alg->cipher_err_cnt, 0); > - atomic_set(&alg->sign_cnt, 0); > + atomic64_set(&alg->verify_cnt, 0); > + atomic64_set(&alg->cipher_err_cnt, 0); > + atomic64_set(&alg->sign_cnt, 0); > #endif > > out: > diff --git a/crypto/crypto_user_stat.c b/crypto/crypto_user_stat.c > index a6fb2e6f618d..352569f378a0 100644 > --- a/crypto/crypto_user_stat.c > +++ b/crypto/crypto_user_stat.c > @@ -35,22 +35,21 @@ static int crypto_report_aead(struct sk_buff *skb, struct crypto_alg *alg) > { > struct crypto_stat raead; > u64 v64; > - u32 v32; > > memset(&raead, 0, sizeof(raead)); > > strscpy(raead.type, "aead", sizeof(raead.type)); > > - v32 = atomic_read(&alg->encrypt_cnt); > - raead.stat_encrypt_cnt = v32; > + v64 = atomic64_read(&alg->encrypt_cnt); > + raead.stat_encrypt_cnt = v64; > v64 = atomic64_read(&alg->encrypt_tlen); > raead.stat_encrypt_tlen = v64; > - v32 = atomic_read(&alg->decrypt_cnt); > - raead.stat_decrypt_cnt = v32; > + v64 = atomic64_read(&alg->decrypt_cnt); > + raead.stat_decrypt_cnt = v64; > v64 = atomic64_read(&alg->decrypt_tlen); > raead.stat_decrypt_tlen = v64; > - v32 = atomic_read(&alg->aead_err_cnt); > - raead.stat_aead_err_cnt = v32; > + v64 = atomic64_read(&alg->aead_err_cnt); > + raead.stat_aead_err_cnt = v64; > > return nla_put(skb, CRYPTOCFGA_STAT_AEAD, sizeof(raead), &raead); > } Why not assign the result of atomic64_read() directly? I don't see the point of the 'v64' variable. - Eric