On Wed, 2005-02-02 at 17:46 -0500, James Morris wrote: > This code tests ok with IPSec, and delivers some good performance > improvements. e.g. FTP transfers over transport mode AES over GigE sped > up with this patch applied on one side of the connection by 20% for send > and 15% for receive. > > There are quite a few coding style and minor issues to be fixed (per > below), and the code should probably then be tested in the -mm tree for a > while (2.6.11 is too soon for mainline merge).
Fixed formating and white-spaces. The biggest change is, that I stripped a redundant check from scatterwalk.c. This omission seems justified and shows no regression on my system. ( http://lkml.org/lkml/2005/2/3/87 ) Can you give it a quick test with ipsec anyhow? Just to make sure. http://clemens.endorphin.org/interdiff-sw.diff is an interdiff to last patch posted, to ease the work of any reviewers. Mostly whitespace changes.. Outlook for the next patches: tweakable cipher modes interface, LRW core, Michal's multiblock rewrite. Fortunately, none of them is as intruding as the scatterwalk change. Signed-off-by: Fruhwirth Clemens <[EMAIL PROTECTED]> --- 1/crypto/cipher.c 2005-01-20 10:15:40.000000000 +0100 +++ 2/crypto/cipher.c 2005-02-05 09:52:30.000000000 +0100 @@ -22,7 +22,7 @@ typedef void (cryptfn_t)(void *, u8 *, const u8 *); typedef void (procfn_t)(struct crypto_tfm *, u8 *, - u8*, cryptfn_t, int enc, void *, int); + u8*, cryptfn_t, int enc, void *, int); static inline void xor_64(u8 *a, const u8 *b) { @@ -38,177 +38,219 @@ ((u32 *)a)[3] ^= ((u32 *)b)[3]; } +static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) +{ + struct cipher_alg *cia = &tfm->__crt_alg->cra_cipher; + + if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) { + tfm->crt_flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; + return -EINVAL; + } else + return cia->cia_setkey(crypto_tfm_ctx(tfm), key, keylen, + &tfm->crt_flags); +} /* - * Generic encrypt/decrypt wrapper for ciphers, handles operations across - * multiple page boundaries by using temporary blocks. In user context, - * the kernel is given a chance to schedule us once per block. + * Electronic Code Book (ECB) mode implementation */ -static int crypt(struct crypto_tfm *tfm, - struct scatterlist *dst, - struct scatterlist *src, - unsigned int nbytes, cryptfn_t crfn, - procfn_t prfn, int enc, void *info) -{ - struct scatter_walk walk_in, walk_out; - const unsigned int bsize = crypto_tfm_alg_blocksize(tfm); - u8 tmp_src[bsize]; - u8 tmp_dst[bsize]; + +struct ecb_process_priv { + struct crypto_tfm *tfm; + cryptfn_t *crfn; +}; + +static int ecb_process_gw(void *priv, int nsg, void **buf) +{ + struct ecb_process_priv *ecb_priv = priv; + ecb_priv->crfn(crypto_tfm_ctx(ecb_priv->tfm), buf[0], buf[1]); + return 0; +} + +static inline int ecb_template(struct crypto_tfm *tfm, + struct scatterlist *dst, + struct scatterlist *src, unsigned int nbytes, cryptfn_t crfn) +{ + int bsize = crypto_tfm_alg_blocksize(tfm); + + struct ecb_process_priv priv = { + .tfm = tfm, + .crfn = crfn, + }; + + struct walk_info ecb_info[3]; + + scatterwalk_info_init(ecb_info+0, dst, bsize, (char[bsize]){}, + SCATTERWALK_IO_OUTPUT); + scatterwalk_info_init(ecb_info+1, src, bsize, (char[bsize]){}, + SCATTERWALK_IO_INPUT); + scatterwalk_info_endtag(ecb_info+2); if (!nbytes) return 0; - if (nbytes % bsize) { tfm->crt_flags |= CRYPTO_TFM_RES_BAD_BLOCK_LEN; return -EINVAL; } - scatterwalk_start(&walk_in, src); - scatterwalk_start(&walk_out, dst); - - for(;;) { - u8 *src_p, *dst_p; - int in_place; - - scatterwalk_map(&walk_in, 0); - scatterwalk_map(&walk_out, 1); - src_p = scatterwalk_whichbuf(&walk_in, bsize, tmp_src); - dst_p = scatterwalk_whichbuf(&walk_out, bsize, tmp_dst); - in_place = scatterwalk_samebuf(&walk_in, &walk_out, - src_p, dst_p); - - nbytes -= bsize; - - scatterwalk_copychunks(src_p, &walk_in, bsize, 0); - - prfn(tfm, dst_p, src_p, crfn, enc, info, in_place); - - scatterwalk_done(&walk_in, 0, nbytes); - - scatterwalk_copychunks(dst_p, &walk_out, bsize, 1); - scatterwalk_done(&walk_out, 1, nbytes); - - if (!nbytes) - return 0; + return scatterwalk_walk(ecb_process_gw, &priv, nbytes/bsize, ecb_info); +} - crypto_yield(tfm); - } +static int ecb_encrypt(struct crypto_tfm *tfm, + struct scatterlist *dst, + struct scatterlist *src, + unsigned int nbytes) +{ + return ecb_template(tfm,dst,src,nbytes,tfm->__crt_alg->cra_cipher.cia_encrypt); } -static void cbc_process(struct crypto_tfm *tfm, u8 *dst, u8 *src, - cryptfn_t fn, int enc, void *info, int in_place) +static int ecb_decrypt(struct crypto_tfm *tfm, + struct scatterlist *dst, + struct scatterlist *src, + unsigned int nbytes) { - u8 *iv = info; + return ecb_template(tfm,dst,src,nbytes,tfm->__crt_alg->cra_cipher.cia_decrypt); +} + +/* Cipher Block Chaining (CBC) mode implementation */ + +struct cbc_process_priv { + struct crypto_tfm *tfm; + int enc; + cryptfn_t *crfn; + u8 *curr_iv; + u8 *next_iv; +}; + +static int cbc_process_gw(void *priv, int nsg, void **buf) +{ + struct cbc_process_priv *cbc_priv = priv; + u8 *iv = cbc_priv->curr_iv; + struct crypto_tfm *tfm = cbc_priv->tfm; + int bsize = crypto_tfm_alg_blocksize(tfm); + u8 *dst = buf[0]; + u8 *src = buf[1]; /* Null encryption */ if (!iv) - return; - - if (enc) { + return 0; + + if (cbc_priv->enc == CRYPTO_DIR_ENCRYPT) { + /* Encryption can be done in place */ tfm->crt_u.cipher.cit_xor_block(iv, src); - fn(crypto_tfm_ctx(tfm), dst, iv); - memcpy(iv, dst, crypto_tfm_alg_blocksize(tfm)); + cbc_priv->crfn(crypto_tfm_ctx(tfm), dst, iv); + memcpy(iv, dst, bsize); } else { - u8 stack[in_place ? crypto_tfm_alg_blocksize(tfm) : 0]; - u8 *buf = in_place ? stack : dst; - - fn(crypto_tfm_ctx(tfm), buf, src); - tfm->crt_u.cipher.cit_xor_block(buf, iv); - memcpy(iv, src, crypto_tfm_alg_blocksize(tfm)); - if (buf != dst) - memcpy(dst, buf, crypto_tfm_alg_blocksize(tfm)); + /* Current cipher text in "src" needs to be saved, as + * it's going to be the next iv, exchange IV buffers + * after processing + */ + memcpy(cbc_priv->next_iv,src,bsize); + cbc_priv->crfn(crypto_tfm_ctx(tfm), dst, src); + tfm->crt_u.cipher.cit_xor_block(dst, iv); + cbc_priv->curr_iv = cbc_priv->next_iv; + cbc_priv->next_iv = iv; } + return 0; } -static void ecb_process(struct crypto_tfm *tfm, u8 *dst, u8 *src, - cryptfn_t fn, int enc, void *info, int in_place) -{ - fn(crypto_tfm_ctx(tfm), dst, src); -} -static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) -{ - struct cipher_alg *cia = &tfm->__crt_alg->cra_cipher; - - if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) { - tfm->crt_flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; +static int cbc_encrypt_iv(struct crypto_tfm *tfm, + struct scatterlist *dst, + struct scatterlist *src, + unsigned int nbytes, u8 *iv) +{ + int bsize = crypto_tfm_alg_blocksize(tfm); + + struct cbc_process_priv priv = { + .tfm = tfm, + .enc = CRYPTO_DIR_ENCRYPT, + .curr_iv = iv, + .crfn = tfm->__crt_alg->cra_cipher.cia_encrypt + }; + + struct walk_info cbc_info[3]; + + if (!nbytes) + return 0; + if (nbytes % bsize) { + tfm->crt_flags |= CRYPTO_TFM_RES_BAD_BLOCK_LEN; return -EINVAL; - } else - return cia->cia_setkey(crypto_tfm_ctx(tfm), key, keylen, - &tfm->crt_flags); -} + } -static int ecb_encrypt(struct crypto_tfm *tfm, - struct scatterlist *dst, - struct scatterlist *src, unsigned int nbytes) -{ - return crypt(tfm, dst, src, nbytes, - tfm->__crt_alg->cra_cipher.cia_encrypt, - ecb_process, 1, NULL); -} + scatterwalk_info_init(cbc_info+0, dst, bsize, (char[bsize]){}, + SCATTERWALK_IO_OUTPUT); + scatterwalk_info_init(cbc_info+1, src, bsize, (char[bsize]){}, + SCATTERWALK_IO_INPUT); + scatterwalk_info_endtag(cbc_info+2); -static int ecb_decrypt(struct crypto_tfm *tfm, - struct scatterlist *dst, - struct scatterlist *src, - unsigned int nbytes) -{ - return crypt(tfm, dst, src, nbytes, - tfm->__crt_alg->cra_cipher.cia_decrypt, - ecb_process, 1, NULL); + return scatterwalk_walk(cbc_process_gw, &priv, nbytes/bsize, cbc_info); } -static int cbc_encrypt(struct crypto_tfm *tfm, - struct scatterlist *dst, - struct scatterlist *src, - unsigned int nbytes) -{ - return crypt(tfm, dst, src, nbytes, - tfm->__crt_alg->cra_cipher.cia_encrypt, - cbc_process, 1, tfm->crt_cipher.cit_iv); -} +static int cbc_decrypt_iv(struct crypto_tfm *tfm, + struct scatterlist *dst, + struct scatterlist *src, + unsigned int nbytes, u8 *iv) +{ + int bsize = crypto_tfm_alg_blocksize(tfm); + int r = -EINVAL; + + char scratch1[bsize]; + + struct cbc_process_priv priv = { + .tfm = tfm, + .enc = CRYPTO_DIR_DECRYPT, + .curr_iv = iv, + .next_iv = scratch1, + .crfn = tfm->__crt_alg->cra_cipher.cia_decrypt, + }; + struct walk_info cbc_info[3]; -static int cbc_encrypt_iv(struct crypto_tfm *tfm, - struct scatterlist *dst, - struct scatterlist *src, - unsigned int nbytes, u8 *iv) -{ - return crypt(tfm, dst, src, nbytes, - tfm->__crt_alg->cra_cipher.cia_encrypt, - cbc_process, 1, iv); + if (!nbytes) + return 0; + if (nbytes % bsize) { + tfm->crt_flags |= CRYPTO_TFM_RES_BAD_BLOCK_LEN; + return -EINVAL; + } + + scatterwalk_info_init(cbc_info+0, dst, bsize, (char[bsize]){}, SCATTERWALK_IO_OUTPUT); + scatterwalk_info_init(cbc_info+1, src, bsize, (char[bsize]){}, SCATTERWALK_IO_INPUT); + scatterwalk_info_endtag(cbc_info+2); + + r = scatterwalk_walk(cbc_process_gw, &priv, nbytes/bsize, cbc_info); + + if (priv.curr_iv != iv) + memcpy(iv,priv.curr_iv,bsize); + return r; } static int cbc_decrypt(struct crypto_tfm *tfm, - struct scatterlist *dst, - struct scatterlist *src, + struct scatterlist *dst, + struct scatterlist *src, unsigned int nbytes) { - return crypt(tfm, dst, src, nbytes, - tfm->__crt_alg->cra_cipher.cia_decrypt, - cbc_process, 0, tfm->crt_cipher.cit_iv); + return cbc_decrypt_iv(tfm, dst, src, nbytes, tfm->crt_cipher.cit_iv); } -static int cbc_decrypt_iv(struct crypto_tfm *tfm, - struct scatterlist *dst, - struct scatterlist *src, - unsigned int nbytes, u8 *iv) -{ - return crypt(tfm, dst, src, nbytes, - tfm->__crt_alg->cra_cipher.cia_decrypt, - cbc_process, 0, iv); +static int cbc_encrypt(struct crypto_tfm *tfm, + struct scatterlist *dst, + struct scatterlist *src, + unsigned int nbytes) +{ + return cbc_encrypt_iv(tfm, dst, src, nbytes, tfm->crt_cipher.cit_iv); } static int nocrypt(struct crypto_tfm *tfm, - struct scatterlist *dst, - struct scatterlist *src, + struct scatterlist *dst, + struct scatterlist *src, unsigned int nbytes) { return -ENOSYS; } static int nocrypt_iv(struct crypto_tfm *tfm, - struct scatterlist *dst, - struct scatterlist *src, - unsigned int nbytes, u8 *iv) + struct scatterlist *dst, + struct scatterlist *src, + unsigned int nbytes, u8 *iv) { return -ENOSYS; } @@ -263,26 +305,26 @@ } if (ops->cit_mode == CRYPTO_TFM_MODE_CBC) { - - switch (crypto_tfm_alg_blocksize(tfm)) { - case 8: - ops->cit_xor_block = xor_64; - break; - - case 16: - ops->cit_xor_block = xor_128; - break; - - default: - printk(KERN_WARNING "%s: block size %u not supported\n", - crypto_tfm_alg_name(tfm), - crypto_tfm_alg_blocksize(tfm)); - ret = -EINVAL; - goto out; - } - + + switch (crypto_tfm_alg_blocksize(tfm)) { + case 8: + ops->cit_xor_block = xor_64; + break; + + case 16: + ops->cit_xor_block = xor_128; + break; + + default: + printk(KERN_WARNING "%s: block size %u not supported\n", + crypto_tfm_alg_name(tfm), + crypto_tfm_alg_blocksize(tfm)); + ret = -EINVAL; + goto out; + } + ops->cit_ivsize = crypto_tfm_alg_blocksize(tfm); - ops->cit_iv = kmalloc(ops->cit_ivsize, GFP_KERNEL); + ops->cit_iv = kmalloc(ops->cit_ivsize, GFP_KERNEL); if (ops->cit_iv == NULL) ret = -ENOMEM; } --- 1/crypto/scatterwalk.h 2005-01-20 10:15:40.000000000 +0100 +++ 2/crypto/scatterwalk.h 2005-02-03 10:07:57.000000000 +0100 @@ -4,6 +4,7 @@ * Copyright (c) 2002 James Morris <[EMAIL PROTECTED]> * Copyright (c) 2002 Adam J. Richter <[EMAIL PROTECTED]> * Copyright (c) 2004 Jean-Luc Cooke <[EMAIL PROTECTED]> + * Copyright (c) 2005 Clemens Fruhwirth <[EMAIL PROTECTED]> * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the Free @@ -16,6 +17,7 @@ #define _CRYPTO_SCATTERWALK_H #include <linux/mm.h> #include <asm/scatterlist.h> +#include <linux/pagemap.h> struct scatter_walk { struct scatterlist *sg; @@ -26,6 +28,16 @@ unsigned int offset; }; +struct walk_info { + struct scatter_walk sw; + int stepsize; + int ioflag; + char *buf; +}; + +#define SCATTERWALK_IO_OUTPUT 1 +#define SCATTERWALK_IO_INPUT 0 + /* Define sg_next is an inline routine now in case we want to change scatterlist to a linked list later. */ static inline struct scatterlist *sg_next(struct scatterlist *sg) @@ -33,19 +45,13 @@ return sg + 1; } -static inline int scatterwalk_samebuf(struct scatter_walk *walk_in, - struct scatter_walk *walk_out, - void *src_p, void *dst_p) -{ - return walk_in->page == walk_out->page && - walk_in->offset == walk_out->offset && - walk_in->data == src_p && walk_out->data == dst_p; -} +typedef int (*sw_proc_func_t)(void *priv, int length, void **buflist); + +int scatterwalk_walk(sw_proc_func_t function, void *priv, int steps, struct walk_info *walk_info_l); + +#define scatterwalk_info_endtag(winfo) (winfo)->sw.sg = NULL; + +void scatterwalk_info_init(struct walk_info *winfo, struct scatterlist *sg, int stepsize, void *buf, int io); -void *scatterwalk_whichbuf(struct scatter_walk *walk, unsigned int nbytes, void *scratch); -void scatterwalk_start(struct scatter_walk *walk, struct scatterlist *sg); -int scatterwalk_copychunks(void *buf, struct scatter_walk *walk, size_t nbytes, int out); -void scatterwalk_map(struct scatter_walk *walk, int out); -void scatterwalk_done(struct scatter_walk *walk, int out, int more); #endif /* _CRYPTO_SCATTERWALK_H */ --- 1/crypto/scatterwalk.c 2005-01-20 10:15:40.000000000 +0100 +++ 2/crypto/scatterwalk.c 2005-02-05 00:14:28.000000000 +0100 @@ -6,6 +6,7 @@ * Copyright (c) 2002 James Morris <[EMAIL PROTECTED]> * 2002 Adam J. Richter <[EMAIL PROTECTED]> * 2004 Jean-Luc Cooke <[EMAIL PROTECTED]> + * 2005 Clemens Fruhwirth <[EMAIL PROTECTED]> * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the Free @@ -28,17 +29,7 @@ KM_SOFTIRQ1, }; -void *scatterwalk_whichbuf(struct scatter_walk *walk, unsigned int nbytes, void *scratch) -{ - if (nbytes <= walk->len_this_page && - (((unsigned long)walk->data) & (PAGE_CACHE_SIZE - 1)) + nbytes <= - PAGE_CACHE_SIZE) - return walk->data; - else - return scratch; -} - -static void memcpy_dir(void *buf, void *sgdata, size_t nbytes, int out) +static inline void memcpy_dir(void *buf, void *sgdata, size_t nbytes, int out) { if (out) memcpy(sgdata, buf, nbytes); @@ -46,7 +37,12 @@ memcpy(buf, sgdata, nbytes); } -void scatterwalk_start(struct scatter_walk *walk, struct scatterlist *sg) +static inline int scatterwalk_needscratch(struct scatter_walk *walk, int nbytes) +{ + return (nbytes <= walk->len_this_page); +} + +static inline void scatterwalk_start(struct scatter_walk *walk, struct scatterlist *sg) { unsigned int rest_of_page; @@ -60,12 +56,19 @@ walk->offset = sg->offset; } -void scatterwalk_map(struct scatter_walk *walk, int out) +void scatterwalk_info_init(struct walk_info *winfo, struct scatterlist *sg, + int stepsize, void *buf, int io) { - walk->data = crypto_kmap(walk->page, out) + walk->offset; + scatterwalk_start(&winfo->sw, sg); + winfo->stepsize = stepsize; + winfo->ioflag = io; + winfo->buf = buf; } -static void scatterwalk_pagedone(struct scatter_walk *walk, int out, +#define scatterwalk_map(walk,out) \ + (walk)->data = crypto_kmap((walk)->page, (out)) + (walk)->offset; + +static inline void scatterwalk_pagedone(struct scatter_walk *walk, int out, unsigned int more) { /* walk->data may be pointing the first byte of the next page; @@ -89,36 +92,103 @@ } } -void scatterwalk_done(struct scatter_walk *walk, int out, int more) -{ - crypto_kunmap(walk->data, out); - if (walk->len_this_page == 0 || !more) - scatterwalk_pagedone(walk, out, more); -} - -/* - * Do not call this unless the total length of all of the fragments - * has been verified as multiple of the block size. - */ -int scatterwalk_copychunks(void *buf, struct scatter_walk *walk, - size_t nbytes, int out) +static inline void scatterwalk_copychunks(void *buf, struct scatter_walk *walk, + size_t nbytes, int out) { if (buf != walk->data) { while (nbytes > walk->len_this_page) { - memcpy_dir(buf, walk->data, walk->len_this_page, out); - buf += walk->len_this_page; - nbytes -= walk->len_this_page; - + if (walk->len_this_page) { + memcpy_dir(buf, walk->data, walk->len_this_page, out); + buf += walk->len_this_page; + nbytes -= walk->len_this_page; + } crypto_kunmap(walk->data, out); - scatterwalk_pagedone(walk, out, 1); + scatterwalk_pagedone(walk, + out, + 1); /* more processing steps */ scatterwalk_map(walk, out); } - memcpy_dir(buf, walk->data, nbytes, out); } - + walk->data += nbytes; walk->offset += nbytes; walk->len_this_page -= nbytes; walk->len_this_segment -= nbytes; - return 0; +} + +/* + * The generic scatterwalker can manipulate data associated with one + * or more scatterlist with a processing function, pf. It's purpose is + * to hide the mapping, unalignment and page switching logic. + * + * The generic scatterwalker applies a certain function, pf, utilising + * an arbitrary number of scatterlist data as it's arguments. These + * arguments are supplied as an array of pointers to buffers. These + * buffers are prepared and processed block-wise by the function + * (stepsize) and might be input or output buffers. + * + * All this informations and the underlaying scatterlist is handed to + * the generic walker as an array of descriptors of type + * walk_info. The sg, stepsize, ioflag and buf field of this struct + * must be initialised. + * + * The sg field points to the scatterlist the function should work on, + * the stepsize is the number of successive bytes that should be + * handed to the function, ioflag denotes input or output scatterlist + * and the buf field is either null, or points to a stepsize-width + * byte block, which can be used as copy buffer, when the stepsize + * does not align with page or scatterlist boundaries. + * + * A list of buffers are compiled and handed to the function, as char + * **buf, with buf[0] corresponds to the first walk_info descriptor, + * buf[1] to the second, and so on. The function is also handed a priv + * object, which does not change. Think of it as a "this" object, to + * collect/store processing information. + */ + +int scatterwalk_walk(sw_proc_func_t pf, void *priv, int steps, + struct walk_info *walk_infos) +{ + int r = -EINVAL; + + int i; + + struct walk_info *csg; + int nsl = 0; + + void **cbuf; + void **dispatch_list; + + for (csg = walk_infos; csg->sw.sg; csg++) { + scatterwalk_map(&csg->sw, csg->ioflag); + nsl++; + } + + dispatch_list = (void *[nsl]){}; /* This alien thing is a C99 compound literal */ + + while (steps--) { + for (csg = walk_infos, cbuf = dispatch_list; csg->sw.sg; i--, csg++, cbuf++) { + *cbuf = scatterwalk_needscratch(&csg->sw,csg->stepsize)?csg->sw.data:csg->buf; + + if (csg->ioflag == 0) + scatterwalk_copychunks(*cbuf,&csg->sw,csg->stepsize,0); + } + + r = pf(priv, nsl, dispatch_list); + if (unlikely(r < 0)) + goto out; + + for (csg = walk_infos, cbuf = dispatch_list; csg->sw.sg; csg++, cbuf++) { + if (csg->ioflag == 1) + scatterwalk_copychunks(*cbuf,&csg->sw,csg->stepsize,1); + } + } + + r = 0; +out: + for (csg = walk_infos; csg->sw.sg; csg++) { + crypto_kunmap(csg->sw.data, csg->ioflag); + scatterwalk_pagedone(&csg->sw, csg->ioflag, 0); + } + return r; } - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/