On Wed, Oct 25, 2017 at 11:26 AM, yaeceh01 <yael.chemla@xxxxxxxxxxxx> wrote: > From: Yael Chemla <yael.chemla@xxxxxxxxxxxx> > > Current implementation makes multiple crypto API calls for a single > block, forcing underlying crypto tfm implementation to "stop & go", > leading to under utilization of CPU (e.g. SIMD state saves) or HW > engines. To fix it unify calls to crypto init/update/final into a digest > call with a single sg which contains multiple buffers. > > This also opens the way later on to parallelizing the work on different > blocks. > > Tested on physical Arm 32 and x86_64 and virtual ARM 64. > > Performance numbers were not changed. > > Signed-off-by: Yael Chemla <yael.chemla@xxxxxxxxxxxx> Reviewed-By: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx> > --- > drivers/md/dm-verity-target.c | 226 +++++++++++++++++++++++++----------------- > 1 file changed, 137 insertions(+), 89 deletions(-) > > diff --git a/drivers/md/dm-verity-target.c b/drivers/md/dm-verity-target.c > index bda3caca23ca..c8758443ef64 100644 > --- a/drivers/md/dm-verity-target.c > +++ b/drivers/md/dm-verity-target.c > @@ -35,10 +35,18 @@ > > #define DM_VERITY_OPTS_MAX (2 + DM_VERITY_OPTS_FEC) > > +/* only two elements in static scatter list: salt and data */ > +#define SG_FIXED_ITEMS 2 > + > static unsigned dm_verity_prefetch_cluster = DM_VERITY_DEFAULT_PREFETCH_SIZE; > > module_param_named(prefetch_cluster, dm_verity_prefetch_cluster, uint, S_IRUGO | S_IWUSR); > > +enum salt_location { > + START_SG, > + END_SG > +}; > + > struct dm_verity_prefetch_work { > struct work_struct work; > struct dm_verity *v; > @@ -133,80 +141,67 @@ static inline int verity_complete_op(struct verity_result *res, int ret) > return ret; > } > > -static int verity_hash_update(struct dm_verity *v, struct ahash_request *req, > - const u8 *data, size_t len, > - struct verity_result *res) > -{ > - struct scatterlist sg; > - > - sg_init_one(&sg, data, len); > - ahash_request_set_crypt(req, &sg, NULL, len); > - > - return verity_complete_op(res, crypto_ahash_update(req)); > -} > - > /* > - * Wrapper for crypto_ahash_init, which handles verity salting. > + * verity_is_salt_required - check if according to verity version and > + * verity salt's size there's a need to insert a salt. > + * note: verity's version indicates where the salt should be added. > + * (before or after buffer) > + * @where - START_SG - before buffer / END_SG - after buffer > */ > -static int verity_hash_init(struct dm_verity *v, struct ahash_request *req, > - struct verity_result *res) > +static inline bool verity_is_salt_required(struct dm_verity *v, > + enum salt_location where) > { > - int r; > - > - ahash_request_set_tfm(req, v->tfm); > - ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_SLEEP | > - CRYPTO_TFM_REQ_MAY_BACKLOG, > - verity_op_done, (void *)res); > - init_completion(&res->completion); > - > - r = verity_complete_op(res, crypto_ahash_init(req)); > - > - if (unlikely(r < 0)) { > - DMERR("crypto_ahash_init failed: %d", r); > - return r; > + if (likely(v->salt_size) && > + ((where == START_SG && likely(v->version >= 1)) || > + (where == END_SG && unlikely(!v->version)))) { > + return true; > } > - > - if (likely(v->salt_size && (v->version >= 1))) > - r = verity_hash_update(v, req, v->salt, v->salt_size, res); > - > - return r; > + return false; > } > > -static int verity_hash_final(struct dm_verity *v, struct ahash_request *req, > - u8 *digest, struct verity_result *res) > +/* > + * verity_add_salt - add verity's salt into a scatterlist > + * @nents - number of elements already inserted into sg > + * @total_len - total number of items in scatterlist array > + */ > +static void verity_add_salt(struct dm_verity *v, struct scatterlist *sg, > + unsigned int *nents, unsigned int *total_len) > { > - int r; > - > - if (unlikely(v->salt_size && (!v->version))) { > - r = verity_hash_update(v, req, v->salt, v->salt_size, res); > - > - if (r < 0) { > - DMERR("verity_hash_final failed updating salt: %d", r); > - goto out; > - } > - } > - > - ahash_request_set_crypt(req, NULL, digest, 0); > - r = verity_complete_op(res, crypto_ahash_final(req)); > -out: > - return r; > + sg_set_buf(&sg[*nents], v->salt, v->salt_size); > + (*nents)++; > + (*total_len) += v->salt_size; > } > > int verity_hash(struct dm_verity *v, struct ahash_request *req, > const u8 *data, size_t len, u8 *digest) > { > - int r; > + int r, total_len = 0, indx = 0; > struct verity_result res; > + struct scatterlist sg[SG_FIXED_ITEMS]; > > - r = verity_hash_init(v, req, &res); > - if (unlikely(r < 0)) > - goto out; > + sg_init_table(sg, SG_FIXED_ITEMS); > + ahash_request_set_tfm(req, v->tfm); > + ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_SLEEP | > + CRYPTO_TFM_REQ_MAY_BACKLOG, > + verity_op_done, (void *)&res); > + if (verity_is_salt_required(v, START_SG) == true) > + verity_add_salt(v, sg, &indx, &total_len); > > - r = verity_hash_update(v, req, data, len, &res); > - if (unlikely(r < 0)) > - goto out; > + sg_set_buf(&sg[indx], data, len); > + indx++; > + total_len += len; > + if (verity_is_salt_required(v, END_SG) == true) > + verity_add_salt(v, sg, &indx, &total_len); > + > + ahash_request_set_crypt(req, sg, digest, len+v->salt_size); > + init_completion(&res.completion); > > - r = verity_hash_final(v, req, digest, &res); > + r = verity_complete_op(&res, crypto_ahash_digest(req)); > + > + if (unlikely(r < 0)) { > + DMERR("ahash_request_set_crypt failed: %d", r); > + goto out; > + } > > out: > return r; > @@ -389,20 +384,17 @@ int verity_hash_for_block(struct dm_verity *v, struct dm_verity_io *io, > * Calculates the digest for the given bio > */ > int verity_for_io_block(struct dm_verity *v, struct dm_verity_io *io, > - struct bvec_iter *iter, struct verity_result *res) > + struct bvec_iter *iter, struct verity_result *res, > + struct scatterlist *sg, unsigned int *nents, > + unsigned int *total_len) > { > unsigned int todo = 1 << v->data_dev_block_bits; > struct bio *bio = dm_bio_from_per_bio_data(io, v->ti->per_io_data_size); > - struct scatterlist sg; > - struct ahash_request *req = verity_io_hash_req(v, io); > > do { > - int r; > unsigned int len; > struct bio_vec bv = bio_iter_iovec(bio, *iter); > > - sg_init_table(&sg, 1); > - > len = bv.bv_len; > > if (likely(len >= todo)) > @@ -412,22 +404,43 @@ int verity_for_io_block(struct dm_verity *v, struct dm_verity_io *io, > * until you consider the typical block size is 4,096B. > * Going through this loops twice should be very rare. > */ > - sg_set_page(&sg, bv.bv_page, len, bv.bv_offset); > - ahash_request_set_crypt(req, &sg, NULL, len); > - r = verity_complete_op(res, crypto_ahash_update(req)); > - > - if (unlikely(r < 0)) { > - DMERR("verity_for_io_block crypto op failed: %d", r); > - return r; > - } > + sg_set_page(&sg[*nents], bv.bv_page, len, bv.bv_offset); > > bio_advance_iter(bio, iter, len); > todo -= len; > + (*nents)++; > + (*total_len) += len; > } while (todo); > > return 0; > } > > +/* calculate how many buffers required to accomudate bio_vec starting > + * from iter > + */ > +unsigned int verity_calc_buffs_for_bv(struct dm_verity *v, > + struct dm_verity_io *io, struct bvec_iter iter) > +{ > + unsigned int todo = 1 << v->data_dev_block_bits; > + struct bio *bio = dm_bio_from_per_bio_data(io, v->ti->per_io_data_size); > + unsigned int buff_count = 0; > + > + do { > + unsigned int len; > + struct bio_vec bv = bio_iter_iovec(bio, iter); > + > + len = bv.bv_len; > + if (likely(len >= todo)) > + len = todo; > + > + bio_advance_iter(bio, &iter, len); > + todo -= len; > + buff_count++; > + } while (todo); > + > + return buff_count; > +} > + > /* > * Calls function process for 1 << v->data_dev_block_bits bytes in the bio_vec > * starting from iter. > @@ -483,16 +496,30 @@ static int verity_verify_io(struct dm_verity_io *io) > struct bvec_iter start; > unsigned b; > struct verity_result res; > + struct scatterlist *sg; > + int r; > > for (b = 0; b < io->n_blocks; b++) { > - int r; > + unsigned int nents; > + unsigned int total_len = 0; > + unsigned int num_of_buffs = 0; > struct ahash_request *req = verity_io_hash_req(v, io); > > + /* an extra one for the salt buffer */ > + num_of_buffs = verity_calc_buffs_for_bv(v, io, io->iter) + 1; > + WARN_ON(num_of_buffs < 1); > + > + sg = kmalloc_array(num_of_buffs, sizeof(struct scatterlist), > + GFP_KERNEL); > + if (!sg) > + return -ENOMEM; > + sg_init_table(sg, num_of_buffs); > + > r = verity_hash_for_block(v, io, io->block + b, > verity_io_want_digest(v, io), > &is_zero); > if (unlikely(r < 0)) > - return r; > + goto err_memfree; > > if (is_zero) { > /* > @@ -502,37 +529,58 @@ static int verity_verify_io(struct dm_verity_io *io) > r = verity_for_bv_block(v, io, &io->iter, > verity_bv_zero); > if (unlikely(r < 0)) > - return r; > + goto err_memfree; > > continue; > } > > - r = verity_hash_init(v, req, &res); > - if (unlikely(r < 0)) > - return r; > + ahash_request_set_tfm(req, v->tfm); > + ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_SLEEP | > + CRYPTO_TFM_REQ_MAY_BACKLOG, > + verity_op_done, (void *)&res); > > - start = io->iter; > - r = verity_for_io_block(v, io, &io->iter, &res); > - if (unlikely(r < 0)) > - return r; > + nents = 0; > + total_len = 0; > + if (verity_is_salt_required(v, START_SG) == true) > + verity_add_salt(v, sg, &nents, &total_len); > > - r = verity_hash_final(v, req, verity_io_real_digest(v, io), > - &res); > - if (unlikely(r < 0)) > - return r; > + start = io->iter; > + verity_for_io_block(v, io, &io->iter, &res, sg, &nents, > + &total_len); > + if (verity_is_salt_required(v, END_SG) == true) > + verity_add_salt(v, sg, &nents, &total_len); > + /* > + * need to mark end of chain, since we might have allocated > + * more than we actually use > + */ > + sg_mark_end(&sg[nents-1]); > > + ahash_request_set_crypt(req, sg, verity_io_real_digest(v, io), > + total_len); > + init_completion(&res.completion); > + r = verity_complete_op(&res, crypto_ahash_digest(req)); > + kfree(sg); > + if (unlikely(r < 0)) { > + DMERR("crypto_ahash_digest failed: %d", r); > + goto err_memfree; > + } > if (likely(memcmp(verity_io_real_digest(v, io), > - verity_io_want_digest(v, io), v->digest_size) == 0)) > + verity_io_want_digest(v, io), v->digest_size) == 0)) > continue; > else if (verity_fec_decode(v, io, DM_VERITY_BLOCK_TYPE_DATA, > io->block + b, NULL, &start) == 0) > continue; > else if (verity_handle_err(v, DM_VERITY_BLOCK_TYPE_DATA, > - io->block + b)) > - return -EIO; > + io->block + b)) { > + goto err_memfree; > + } > } > > return 0; > + > +err_memfree: > + kfree(sg); > + return r; > } > > /* > -- > 2.11.0 > > -- > dm-devel mailing list > dm-devel@xxxxxxxxxx > https://www.redhat.com/mailman/listinfo/dm-devel -- Gilad Ben-Yossef Chief Coffee Drinker "If you take a class in large-scale robotics, can you end up in a situation where the homework eats your dog?" -- Jean-Baptiste Queru -- dm-devel mailing list dm-devel@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/dm-devel