From: Jonathan Cameron <Jonathan.Cameron@huawei.com>
To: Stephan Mueller <smueller@chronox.de>
Cc: <linux-crypto@vger.kernel.org>, <harsh@chelsio.com>,
<linuxarm@huawei.com>
Subject: Re: [RFC] AF_ALG AIO and IV
Date: Mon, 15 Jan 2018 14:42:58 +0000 [thread overview]
Message-ID: <20180115144258.00002dbe@huawei.com> (raw)
In-Reply-To: <9541120.PIfOYyT9eV@tauon.chronox.de>
On Mon, 15 Jan 2018 15:31:42 +0100
Stephan Mueller <smueller@chronox.de> wrote:
> Am Montag, 15. Januar 2018, 15:25:38 CET schrieb Jonathan Cameron:
>
> Hi Jonathan,
>
> > On Mon, 15 Jan 2018 14:15:42 +0100
> >
> > Stephan Mueller <smueller@chronox.de> wrote:
> > > Am Montag, 15. Januar 2018, 13:59:27 CET schrieb Jonathan Cameron:
> > >
> > > Hi Jonathan,
> > >
> > > > > But there may be hardware that cannot/will not track such
> > > > > dependencies.
> > > > > Yet, it has multiple hardware queues. Such hardware can still handle
> > > > > parallel requests when they are totally independent from each other.
> > > > > For
> > > > > such a case, AF_ALG currently has no support, because it lacks the
> > > > > support for setting multiple IVs for the multiple concurrent calls.
> > > >
> > > > Agreed, something like your new support is needed - I just suspect we
> > > > need
> > > > a level between one socket one iv chain and every IOCB with own IV and
> > > > right now the only way to hit that balance is to have a separate socket
> > > > for each IV chain. Not exactly efficient use of resources though it
> > > > will
> > > > work.
> > >
> > > How would you propose such support via AF_ALG?
> > > Wouldn't it be possible to
> > > arrange the IOVEC array in user space appropriately before calling the
> > > AF_ALG interface? In this case, I would still see that the current AF_ALG
> > > (plus the patch) would support all use cases I am aware of.
> >
> > I'm not sure how that would work, but maybe I'm missing something - are you
> > suggesting we could contrive the situation where the kernel side can tell
> > it is getting the same IV multiple times and hence know that it should chain
> > it? We are talking streaming here - we don't have the data for the later
> > elements when the first ones are queued up.
> >
> > One approach to handling token based IV - where the token refers to an IV
> > without being it's value would be to add another flag similar to the one
> > you used for inline IV.
>
> What about:
>
> sendmsg(IV, data)
> sendmsg(data)
> ..
> AIO recvmsg with multiple IOCBs
> AIO recvmsg with multiple IOCBs
> ..
> sendmsg(IV, data)
> ..
>
> This implies, however, that before the sendmsg with the second IV is sent, all
> AIO operations from the first invocation would need to be finished.
Yes that works fine, but rather restricts the flow - you would end up waiting
until you could concatenate a bunch of data in userspace so as to trade
off against the slow down whenever you need to synchronize back up to userspace.
> >
> > You would then set the IV as you have done, but also provide a magic value
> > by which to track the chain. Later IOCBs using the same IV chain would
> > just provide the magic token.
> >
> > You'd also need some way of retiring the IV eventually once you were done
> > with it or ultimately you would run out of resources.
>
> Let me think about that approach a bit.
>
> > >
> > > What AF_ALG should do is to enable different vendors like yourself to use
> > > the most appropriate solution. AF_ALG shall not limit users in any way.
> > Agreed, but we also need to have some consistency for userspace to have some
> > awareness of what it should be using. Last thing we want is lots of higher
> > level software having to have knowledge of the encryption hardware
> > underneath. Hence I think we should keep the options to the minimum
> > possible or put the burden on drivers that must play well with all options
> > (be it not as efficiently for the ones that work badly for them).
> >
> > > Thus, AF_ALG allows multiple sockets, if desired. It allows a stream usage
> > > with one setiv call applicable to multiple cipher operations. And with the
> > > offered patch it would allow multiple concurrent and yet independent
> > > cipher
> > > operations. Whichever use case is right for you, AF_ALG should not block
> > > you from applying it. Yet, what is good for you may not be good for
> > > others. Thus, these others may implement a different usage strategy for
> > > AF_ALG. The good thing is that this strategy is defined by user space.
> > >
> > > In case you see a use case that is prevented by AF_ALG, it would be great
> > > to hear about it to see whether we can support it.
> >
> > The usecase isn't blocked, but if you have hardware that is doing the IV
> > management then it is not efficiently handled. Either
> > 1) You move the chaining up to userspace - throughput on a given chain will
> > be awful - basically all the advantages of AIO are gone - fine if you
> > know you only care about bandwidth with lots of separate IV chains.
>
> This sounds not like the right path.
> >
> > 2) You open a socket per IV chain and eat resources.
>
> Ok, AF_ALG allows this.
That was my plan before this discussion started. Ugly but works without
any AF_ALG changes.
We can probably play some internal games to make this not as bad as it
initially seems, but still not nice.
Jonathan
> >
> > Jonathan
> >
> > > Ciao
> > > Stephan
>
>
>
> Ciao
> Stephan
>
>
next prev parent reply other threads:[~2018-01-15 14:43 UTC|newest]
Thread overview: 63+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-01-12 13:21 [RFC] AF_ALG AIO and IV Stephan Mueller
2018-01-15 9:35 ` [PATCH] crypto: AF_ALG - inline IV support Stephan Mueller
2018-01-21 12:14 ` Stephan Müller
2018-01-23 11:02 ` Harsh Jain
2018-01-30 8:27 ` [PATCH] crypto: AF_ALG AIO - lock context IV Stephan Müller
2018-01-30 14:04 ` Stephan Mueller
2018-01-30 15:51 ` Jonathan Cameron
2018-01-31 12:29 ` Jonathan Cameron
2018-02-01 9:35 ` Gilad Ben-Yossef
2018-02-01 9:46 ` Stephan Mueller
2018-02-01 10:06 ` Gilad Ben-Yossef
2018-02-01 10:15 ` Stephan Mueller
2018-02-01 10:04 ` Stephan Mueller
2018-02-01 10:07 ` Gilad Ben-Yossef
2018-02-01 10:25 ` Jonathan Cameron
2018-02-01 10:55 ` Harsh Jain
2018-02-07 7:42 ` [PATCH v2 0/4] crypto: AF_ALG AIO improvements Stephan Müller
2018-02-07 7:43 ` [PATCH v2 1/4] crypto: AF_ALG AIO - lock context IV Stephan Müller
2018-02-07 7:43 ` [PATCH v2 2/4] crypto: AF_ALG - inline IV support Stephan Müller
2018-02-07 13:54 ` Jonathan Cameron
2018-02-07 14:01 ` Stephan Müller
2018-02-07 7:43 ` [PATCH v2 3/4] crypto: AF_ALG - allow driver to serialize IV access Stephan Müller
2018-02-07 7:44 ` [PATCH v2 4/4] crypto: add CRYPTO_TFM_REQ_PARALLEL flag Stephan Müller
2018-02-07 12:48 ` Stephan Mueller
2018-02-07 15:39 ` Jonathan Cameron
2018-02-07 15:43 ` Stephan Mueller
2018-02-07 16:14 ` Jonathan Cameron
2018-02-07 16:25 ` Stephan Mueller
2018-02-07 8:52 ` [PATCH v2 0/4] crypto: AF_ALG AIO improvements Harsh Jain
2018-02-07 15:37 ` Jonathan Cameron
2018-02-09 22:02 ` [PATCH v3 " Stephan Müller
2018-02-09 22:03 ` [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV Stephan Müller
2018-02-14 5:43 ` Harsh Jain
2018-02-14 12:52 ` Stephan Mueller
2018-02-15 5:30 ` Harsh Jain
2018-02-15 6:28 ` Stephan Mueller
2018-02-15 7:03 ` Harsh Jain
2018-02-15 7:17 ` Stephan Mueller
2018-02-15 11:38 ` Harsh Jain
2018-02-15 11:45 ` Stephan Mueller
2018-02-15 12:45 ` Harsh Jain
2018-02-15 13:04 ` Stephan Mueller
2018-02-15 13:26 ` Jeffrey Walton
2018-02-15 18:09 ` Stephan Mueller
2018-02-09 22:03 ` [PATCH v3 2/4] crypto: AF_ALG - inline IV support Stephan Müller
2018-02-09 22:04 ` [PATCH v3 3/4] crypto: AF_ALG - allow driver to serialize IV access Stephan Müller
2018-02-09 22:04 ` [PATCH v3 4/4] crypto: add CRYPTO_TFM_REQ_IV_SERIALIZE flag Stephan Müller
2018-02-14 5:50 ` Harsh Jain
2018-02-14 12:47 ` Stephan Mueller
2018-01-22 14:11 ` [PATCH] crypto: AF_ALG - inline IV support Jonathan Cameron
2018-01-22 14:30 ` Stephan Mueller
2018-01-22 14:52 ` Jonathan Cameron
2018-01-15 9:39 ` [RFC] AF_ALG AIO and IV Stephan Mueller
2018-01-15 11:05 ` Jonathan Cameron
2018-01-15 12:07 ` Stephan Mueller
2018-01-15 12:59 ` Jonathan Cameron
2018-01-15 13:15 ` Stephan Mueller
2018-01-15 14:25 ` Jonathan Cameron
2018-01-15 14:31 ` Stephan Mueller
2018-01-15 14:42 ` Jonathan Cameron [this message]
2018-01-16 6:28 ` Stephan Mueller
2018-01-16 10:51 ` Jonathan Cameron
2018-01-15 14:37 ` Jonathan Cameron
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180115144258.00002dbe@huawei.com \
--to=jonathan.cameron@huawei.com \
--cc=harsh@chelsio.com \
--cc=linux-crypto@vger.kernel.org \
--cc=linuxarm@huawei.com \
--cc=smueller@chronox.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).