mirror of
https://git.proxmox.com/git/mirror_zfs.git
synced 2026-05-22 02:27:36 +03:00
Linux 4.14, 4.19, 5.0+ compat: SIMD save/restore
Contrary to initial testing we cannot rely on these kernels to invalidate the per-cpu FPU state and restore the FPU registers. Nor can we guarantee that the kernel won't modify the FPU state which we saved in the task struck. Therefore, the kfpu_begin() and kfpu_end() functions have been updated to save and restore the FPU state using our own dedicated per-cpu FPU state variables. This has the additional advantage of allowing us to use the FPU again in user threads. So we remove the code which was added to use task queues to ensure some functions ran in kernel threads. Reviewed-by: Fabian Grünbichler <f.gruenbichler@proxmox.com> Reviewed-by: Tony Hutter <hutter2@llnl.gov> Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov> Issue #9346 Closes #9403
This commit is contained in:
+1
-1
@@ -8136,7 +8136,7 @@ l2arc_apply_transforms(spa_t *spa, arc_buf_hdr_t *hdr, uint64_t asize,
|
||||
if (ret != 0)
|
||||
goto error;
|
||||
|
||||
ret = zio_do_crypt_abd(spa, B_TRUE, &dck->dck_key,
|
||||
ret = zio_do_crypt_abd(B_TRUE, &dck->dck_key,
|
||||
hdr->b_crypt_hdr.b_ot, bswap, hdr->b_crypt_hdr.b_salt,
|
||||
hdr->b_crypt_hdr.b_iv, mac, psize, to_write, eabd,
|
||||
&no_crypt);
|
||||
|
||||
+10
-10
@@ -601,8 +601,8 @@ dsl_crypto_key_open(objset_t *mos, dsl_wrapping_key_t *wkey,
|
||||
* Unwrap the keys. If there is an error return EACCES to indicate
|
||||
* an authentication failure.
|
||||
*/
|
||||
ret = zio_crypt_key_unwrap(mos->os_spa, &wkey->wk_key, crypt, version,
|
||||
guid, raw_keydata, raw_hmac_keydata, iv, mac, &dck->dck_key);
|
||||
ret = zio_crypt_key_unwrap(&wkey->wk_key, crypt, version, guid,
|
||||
raw_keydata, raw_hmac_keydata, iv, mac, &dck->dck_key);
|
||||
if (ret != 0) {
|
||||
ret = SET_ERROR(EACCES);
|
||||
goto error;
|
||||
@@ -1221,7 +1221,6 @@ dsl_crypto_key_sync(dsl_crypto_key_t *dck, dmu_tx_t *tx)
|
||||
{
|
||||
zio_crypt_key_t *key = &dck->dck_key;
|
||||
dsl_wrapping_key_t *wkey = dck->dck_wkey;
|
||||
objset_t *mos = tx->tx_pool->dp_meta_objset;
|
||||
uint8_t keydata[MASTER_KEY_MAX_LEN];
|
||||
uint8_t hmac_keydata[SHA512_HMAC_KEYLEN];
|
||||
uint8_t iv[WRAPPING_IV_LEN];
|
||||
@@ -1231,13 +1230,14 @@ dsl_crypto_key_sync(dsl_crypto_key_t *dck, dmu_tx_t *tx)
|
||||
ASSERT3U(key->zk_crypt, <, ZIO_CRYPT_FUNCTIONS);
|
||||
|
||||
/* encrypt and store the keys along with the IV and MAC */
|
||||
VERIFY0(zio_crypt_key_wrap(mos->os_spa, &dck->dck_wkey->wk_key, key,
|
||||
iv, mac, keydata, hmac_keydata));
|
||||
VERIFY0(zio_crypt_key_wrap(&dck->dck_wkey->wk_key, key, iv, mac,
|
||||
keydata, hmac_keydata));
|
||||
|
||||
/* update the ZAP with the obtained values */
|
||||
dsl_crypto_key_sync_impl(mos, dck->dck_obj, key->zk_crypt,
|
||||
wkey->wk_ddobj, key->zk_guid, iv, mac, keydata, hmac_keydata,
|
||||
wkey->wk_keyformat, wkey->wk_salt, wkey->wk_iters, tx);
|
||||
dsl_crypto_key_sync_impl(tx->tx_pool->dp_meta_objset, dck->dck_obj,
|
||||
key->zk_crypt, wkey->wk_ddobj, key->zk_guid, iv, mac, keydata,
|
||||
hmac_keydata, wkey->wk_keyformat, wkey->wk_salt, wkey->wk_iters,
|
||||
tx);
|
||||
}
|
||||
|
||||
typedef struct spa_keystore_change_key_args {
|
||||
@@ -2846,8 +2846,8 @@ spa_do_crypt_abd(boolean_t encrypt, spa_t *spa, const zbookmark_phys_t *zb,
|
||||
}
|
||||
|
||||
/* call lower level function to perform encryption / decryption */
|
||||
ret = zio_do_crypt_data(spa, encrypt, &dck->dck_key, ot, bswap, salt,
|
||||
iv, mac, datalen, plainbuf, cipherbuf, no_crypt);
|
||||
ret = zio_do_crypt_data(encrypt, &dck->dck_key, ot, bswap, salt, iv,
|
||||
mac, datalen, plainbuf, cipherbuf, no_crypt);
|
||||
|
||||
/*
|
||||
* Handle injected decryption faults. Unfortunately, we cannot inject
|
||||
|
||||
@@ -445,7 +445,7 @@ benchmark_raidz_impl(raidz_map_t *bench_rm, const int fn, benchmark_fn bench_fn)
|
||||
* Initialize and benchmark all supported implementations.
|
||||
*/
|
||||
static void
|
||||
benchmark_raidz(void *arg)
|
||||
benchmark_raidz(void)
|
||||
{
|
||||
raidz_impl_ops_t *curr_impl;
|
||||
int i, c;
|
||||
@@ -515,20 +515,10 @@ benchmark_raidz(void *arg)
|
||||
void
|
||||
vdev_raidz_math_init(void)
|
||||
{
|
||||
#if defined(_KERNEL)
|
||||
/*
|
||||
* For 5.0 and latter Linux kernels the fletcher 4 benchmarks are
|
||||
* run in a kernel threads. This is needed to take advantage of the
|
||||
* SIMD functionality, see include/linux/simd_x86.h for details.
|
||||
*/
|
||||
taskqid_t id = taskq_dispatch(system_taskq, benchmark_raidz,
|
||||
NULL, TQ_SLEEP);
|
||||
if (id != TASKQID_INVALID) {
|
||||
taskq_wait_id(system_taskq, id);
|
||||
} else {
|
||||
benchmark_raidz(NULL);
|
||||
}
|
||||
/* Determine the fastest available implementation. */
|
||||
benchmark_raidz();
|
||||
|
||||
#if defined(_KERNEL)
|
||||
/* Install kstats for all implementations */
|
||||
raidz_math_kstat = kstat_create("zfs", 0, "vdev_raidz_bench", "misc",
|
||||
KSTAT_TYPE_RAW, 0, KSTAT_FLAG_VIRTUAL);
|
||||
@@ -541,8 +531,6 @@ vdev_raidz_math_init(void)
|
||||
raidz_math_kstat_addr);
|
||||
kstat_install(raidz_math_kstat);
|
||||
}
|
||||
#else
|
||||
benchmark_raidz(NULL);
|
||||
#endif
|
||||
|
||||
/* Finish initialization */
|
||||
|
||||
Reference in New Issue
Block a user