From: Eric Biggers <ebiggers@kernel.org>
To: Herbert Xu <herbert@gondor.apana.org.au>
Cc: linux-crypto@vger.kernel.org, fsverity@lists.linux.dev,
dm-devel@lists.linux.dev, x86@kernel.org,
linux-arm-kernel@lists.infradead.org, ardb@kernel.org,
samitolvanen@google.com, bvanassche@acm.org
Subject: Re: [PATCH v3 6/8] fsverity: improve performance by using multibuffer hashing
Date: Thu, 30 May 2024 23:13:48 -0700 [thread overview]
Message-ID: <20240531061348.GG6505@sol.localdomain> (raw)
In-Reply-To: <ZllXDOJKW2pHWBTz@gondor.apana.org.au>
On Fri, May 31, 2024 at 12:50:20PM +0800, Herbert Xu wrote:
> Eric Biggers <ebiggers@kernel.org> wrote:
> >
> > + if (multibuffer) {
> > + if (ctx->pending_data) {
> > + /* Hash and verify two data blocks. */
> > + err = fsverity_hash_2_blocks(params,
> > + inode,
> > + ctx->pending_data,
> > + data,
> > + ctx->hash1,
> > + ctx->hash2);
> > + kunmap_local(data);
> > + kunmap_local(ctx->pending_data);
> > + ctx->pending_data = NULL;
> > + if (err != 0 ||
> > + !verify_data_block(inode, vi, ctx->hash1,
> > + ctx->pending_pos,
> > + ctx->max_ra_pages) ||
> > + !verify_data_block(inode, vi, ctx->hash2,
> > + pos, ctx->max_ra_pages))
> > + return false;
> > + } else {
> > + /* Wait and see if there's another block. */
> > + ctx->pending_data = data;
> > + ctx->pending_pos = pos;
> > + }
> > + } else {
> > + /* Hash and verify one data block. */
> > + err = fsverity_hash_block(params, inode, data,
> > + ctx->hash1);
> > + kunmap_local(data);
> > + if (err != 0 ||
> > + !verify_data_block(inode, vi, ctx->hash1,
> > + pos, ctx->max_ra_pages))
> > + return false;
> > + }
> > + pos += block_size;
>
> I think this complexity is gross. Look at how we did GSO in
> networking. There should be a unified code-path for aggregated
> data and simple data, not an aggregated path versus a simple path.
>
> I think ultimately it stems from the fact that this code went from
> ahash to shash. What were the issues back then? If it's just vmalloc
> we should fix ahash to support that, rather than making users of the
> Crypto API go through contortions like this.
It can't be asynchronous, period. As I've explained, that would be far too
complex, and it would also defeat the purpose because it would make performance
worse. Messages *must* be queued up and hashed in the caller's context.
What could make sense would be some helper functions and an associated struct
for queueing up messages for a particular crypto_shash, up to its mb_max_msgs
value, and then flushing them and retrieving the digests. These would be
provided by the crypto API.
I think this would address your concern, in that the users (fsverity and
dm-verity) would have a unified code path for multiple vs. single blocks.
I didn't think it would be worthwhile to go there yet, given that fsverity and
dm-verity just want 2x or 1x, and it ends up being simpler and more efficient to
handle those cases directly. But we could go with the more general queueing
helper functions instead if you feel they should be included from the start.
- Eric
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
next prev parent reply other threads:[~2024-05-31 6:14 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-05-07 0:23 [PATCH v3 0/8] Optimize dm-verity and fsverity using multibuffer hashing Eric Biggers
2024-05-07 0:23 ` [PATCH v3 1/8] crypto: shash - add support for finup_mb Eric Biggers
2024-05-07 0:23 ` [PATCH v3 2/8] crypto: testmgr - generate power-of-2 lengths more often Eric Biggers
2024-05-07 0:23 ` [PATCH v3 3/8] crypto: testmgr - add tests for finup_mb Eric Biggers
2024-05-07 0:23 ` [PATCH v3 4/8] crypto: x86/sha256-ni - add support " Eric Biggers
2024-05-07 0:23 ` [PATCH v3 5/8] crypto: arm64/sha256-ce " Eric Biggers
2024-05-07 0:23 ` [PATCH v3 6/8] fsverity: improve performance by using multibuffer hashing Eric Biggers
2024-05-31 4:50 ` Herbert Xu
2024-05-31 6:13 ` Eric Biggers [this message]
2024-05-31 6:52 ` Eric Biggers
2024-05-31 8:49 ` Herbert Xu
2024-05-31 18:51 ` Eric Biggers
2024-06-03 18:50 ` Eric Biggers
2024-06-04 9:39 ` Herbert Xu
2024-05-31 8:38 ` Herbert Xu
2024-05-07 0:23 ` [PATCH v3 7/8] dm-verity: hash blocks with shash import+finup when possible Eric Biggers
2024-05-07 0:23 ` [PATCH v3 8/8] dm-verity: improve performance by using multibuffer hashing Eric Biggers
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20240531061348.GG6505@sol.localdomain \
--to=ebiggers@kernel.org \
--cc=ardb@kernel.org \
--cc=bvanassche@acm.org \
--cc=dm-devel@lists.linux.dev \
--cc=fsverity@lists.linux.dev \
--cc=herbert@gondor.apana.org.au \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-crypto@vger.kernel.org \
--cc=samitolvanen@google.com \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).