From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.9 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id DC7E6C433FF for ; Tue, 13 Aug 2019 00:53:41 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 8B78E20842 for ; Tue, 13 Aug 2019 00:53:41 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="FBebnP+/"; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="kuQHYJf9" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726852AbfHMAxM (ORCPT ); Mon, 12 Aug 2019 20:53:12 -0400 Received: from userp2120.oracle.com ([156.151.31.85]:57686 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726463AbfHMAxJ (ORCPT ); Mon, 12 Aug 2019 20:53:09 -0400 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x7D0nMiu169580; Tue, 13 Aug 2019 00:52:44 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : mime-version : content-transfer-encoding; s=corp-2019-08-05; bh=nDF8j2V783xQlVgIBQP+OzlKRUQHIDuBqsKy0wuVa48=; b=FBebnP+/i+J3vALvO4/lo4XYFiJDG3f6FYXO52tibu4rAFZhBt/5X65rhoPdIq+mgx0j TdtAo3QgUECffGkBZ0Iv/AP2XmYd4/USX9RWq27PgZdUOI26snTpkYQKZJVSysaLy6Gw h8mGxDRqhPo8PSYCpcOxDKBcZlb+Tz8HjDDdyo+9QwEOSLzXB5d9us/K02Lu8SRHfv4q 6eaf6wSdHn9hi4z/E3t/Lotz88JOjGba0UEm0oE74+jlbPulymo8VGBZALPN6wR8WXXw odd8TelEjruWBO1z6D4d0BN62rNvJ+ETmbo9d0Si7mFJBV/Fc7F0kjlUFm0Pbw1Nuxru wA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : mime-version : content-transfer-encoding; s=corp-2018-07-02; bh=nDF8j2V783xQlVgIBQP+OzlKRUQHIDuBqsKy0wuVa48=; b=kuQHYJf9W0ceBWylai8myHQBWmr1Tz7fwAmA6KNcoVIPqxJyF9HXVwGpGUoLvxhU5Nkm 7xyjoCpnM3In7bkiIUa20TRMAvsKJFGrFaJMewy1huCHa73+KtWKlhaSsUxZDCkICTnG X5eleFO2rAhtf816gwNDyS5QL+OIWTNbLQZXtbom3RtAwWT1Cyr9DYbFfoliPxDDTbua ebKZp2c2TQiNCLlWb+ON41HuKYBnijgp4UeMI48Tz/hG3UR+8yZ0pl9tzZi5XHiQvb1R HivvIpiYBN502PMYW9+LE9QIM3besL9Z7kuK2/Jhl3k/9wDu4TGfkGSR6tx9OMImySNj qw== Received: from aserp3030.oracle.com (aserp3030.oracle.com [141.146.126.71]) by userp2120.oracle.com with ESMTP id 2u9pjqarhm-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 13 Aug 2019 00:52:44 +0000 Received: from pps.filterd (aserp3030.oracle.com [127.0.0.1]) by aserp3030.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x7D0mw4g039041; Tue, 13 Aug 2019 00:52:43 GMT Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by aserp3030.oracle.com with ESMTP id 2u9m0ar7k3-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 13 Aug 2019 00:52:43 +0000 Received: from abhmp0022.oracle.com (abhmp0022.oracle.com [141.146.116.28]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id x7D0qcp7003216; Tue, 13 Aug 2019 00:52:38 GMT Received: from parnassus.us.oracle.com (/10.39.240.231) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 12 Aug 2019 17:52:37 -0700 From: Daniel Jordan To: Herbert Xu , Steffen Klassert Cc: Lai Jiangshan , Peter Zijlstra , Tejun Heo , Daniel Jordan , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 0/9] padata: use unbound workqueues for parallel jobs Date: Mon, 12 Aug 2019 20:52:15 -0400 Message-Id: <20190813005224.30779-1-daniel.m.jordan@oracle.com> X-Mailer: git-send-email 2.22.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9347 signatures=668685 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1906280000 definitions=main-1908130005 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9347 signatures=668685 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1906280000 definitions=main-1908130005 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi, No objections the first time around[*], so this series is no longer RFC. The code is the same other than being rebased on recent padata fixes. Any feedback or testing welcome. Thanks, Daniel RFC -> v1: - Included Tejun's acks. - Added testing section to cover letter. Padata binds the parallel part of a job to a single CPU and round-robins over all CPUs in the system for each successive job. Though the serial parts rely on per-CPU queues for correct ordering, they're not necessary for parallel work, and it improves performance to run the job locally on NUMA machines and let the scheduler pick the CPU within a node on a busy system. This series makes parallel padata jobs run on unbound workqueues. Patch Description ----- ----------- 1 Make a padata instance allocate its workqueue internally. 2 Unconfine some recently-confined workqueue interfaces. 3-6 Address recursive CPU hotplug locking issue. padata_alloc* requires its callers to hold this lock, but allocating an unbound workqueue and calling apply_workqueue_attrs also take it. Fix by removing the requirement for callers of padata_alloc*. 7-8 Add a second workqueue for each padata instance that's dedicated to parallel jobs. 9 Small cleanup. Performance ----------- Measurements are from a 2-socket, 20-core, 40-CPU Xeon server. For repeatability, modprobe was bound to a CPU and the serial cpumasks for both pencrypt and pdecrypt were also restricted to a CPU different from modprobe's. # modprobe tcrypt alg="pcrypt(rfc4106(gcm(aes)))" type=3 # modprobe tcrypt mode=211 sec=1 # modprobe tcrypt mode=215 sec=1 Busy system (tcrypt run while 10 stress-ng tasks were burning 100% CPU) base test ---------------- --------------- speedup key_sz blk_sz ops/sec stdev ops/sec stdev (pcrypt(rfc4106-gcm-aesni)) encryption (tcrypt mode=211) 117.2x 160 16 960 30 112555 24775 135.1x 160 64 845 246 114145 25124 113.2x 160 256 993 17 112395 24714 111.3x 160 512 1000 0 111252 23755 110.0x 160 1024 983 16 108153 22374 104.2x 160 2048 985 22 102563 20530 98.5x 160 4096 998 3 98346 18777 86.2x 160 8192 1000 0 86173 14480 (pcrypt(rfc4106-gcm-aesni)) decryption (tcrypt mode=211) 127.2x 160 16 997 5 126834 24244 128.4x 160 64 1000 0 128438 23261 127.6x 160 256 992 7 126627 23493 124.0x 160 512 1000 0 123958 22746 122.8x 160 1024 989 20 121372 22632 112.8x 160 2048 998 3 112602 18287 106.9x 160 4096 994 10 106255 16111 91.7x 160 8192 1000 0 91742 11670 multibuffer (pcrypt(rfc4106-gcm-aesni)) encryption (tcrypt mode=215) 242.2x 160 16 2363 141 572189 16846 242.1x 160 64 2397 151 580424 11923 231.1x 160 256 2472 21 571387 16364 237.6x 160 512 2429 24 577264 8692 238.3x 160 1024 2384 97 568155 6621 216.3x 160 2048 2453 74 530627 3480 209.2x 160 4096 2381 206 498192 19177 176.5x 160 8192 2323 157 410013 9903 multibuffer (pcrypt(rfc4106-gcm-aesni)) decryption (tcrypt mode=215) 220.3x 160 16 2341 228 515733 91317 216.6x 160 64 2467 33 534381 101262 217.7x 160 256 2451 45 533443 85418 213.8x 160 512 2485 26 531293 83767 211.0x 160 1024 2472 28 521677 80339 200.8x 160 2048 2459 67 493808 63587 188.8x 160 4096 2491 9 470325 58055 159.9x 160 8192 2459 51 393147 25756 Idle system (tcrypt run by itself) base test ---------------- --------------- speedup key_sz blk_sz ops/sec stdev ops/sec stdev (pcrypt(rfc4106-gcm-aesni)) encryption (tcrypt mode=211) 2.5x 160 16 63412 43075 161615 1034 4.1x 160 64 39554 24006 161653 981 6.0x 160 256 26504 1436 160110 1158 6.2x 160 512 25500 40 157018 951 5.9x 160 1024 25777 1094 151852 915 5.8x 160 2048 24653 218 143756 508 5.6x 160 4096 24333 20 136752 548 5.0x 160 8192 23310 15 117660 481 (pcrypt(rfc4106-gcm-aesni)) decryption (tcrypt mode=211) 2.4x 160 16 53471 48279 128047 31328 3.4x 160 64 37712 20855 128187 31074 4.5x 160 256 27911 4378 126430 31084 4.9x 160 512 25346 175 123870 29099 3.1x 160 1024 38452 23118 120817 26846 4.7x 160 2048 24612 187 115036 23942 4.5x 160 4096 24217 114 109583 21559 4.2x 160 8192 23144 108 96850 16686 multibuffer (pcrypt(rfc4106-gcm-aesni)) encryption (tcrypt mode=215) 1.0x 160 16 412157 3855 426973 1591 1.0x 160 64 412600 4410 431920 4224 1.1x 160 256 410352 3254 453691 17831 1.2x 160 512 406293 4948 473491 39818 1.2x 160 1024 395123 7804 478539 27660 1.2x 160 2048 385144 7601 453720 17579 1.2x 160 4096 371989 3631 449923 15331 1.2x 160 8192 346723 1617 399824 18559 multibuffer (pcrypt(rfc4106-gcm-aesni)) decryption (tcrypt mode=215) 1.1x 160 16 407317 1487 452619 14404 1.1x 160 64 411821 4261 464059 23541 1.2x 160 256 408941 4945 477483 36576 1.2x 160 512 406451 611 472661 11038 1.2x 160 1024 394813 2667 456357 11452 1.2x 160 2048 390291 4175 448928 8957 1.2x 160 4096 371904 1068 449344 14225 1.2x 160 8192 344227 1973 404397 19540 Testing ------- In addition to the bare metal performance runs above, this series was tested in a kvm guest with the tcrypt module (mode=215). All combinations of CPUs among parallel_cpumask, serial_cpumask, and CPU hotplug online/offline were run with 4 possible CPUs, and over 1000 random combinations of these were run with 8 possible CPUs. Workqueue events were used throughout to verify that all parallel and serial workers executed on only the CPUs allowed by the cpumask sysfs files. Finally, tcrypt mode=211 and mode=215 were run at each patch in the series when built with and without CONFIG_PADATA/CONFIG_CRYPTO_PCRYPT. Dependencies ------------ Series based on 5.2 plus recent workqueue and padata changes. A branch with all prerequisite patches available at git://oss.oracle.com/git/linux-dmjordan.git padata-unbound-wq * https://lore.kernel.org/lkml/20190725212505.15055-1-daniel.m.jordan@oracle.com/ Daniel Jordan (9): padata: allocate workqueue internally workqueue: unconfine alloc/apply/free_workqueue_attrs() workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs padata: make padata_do_parallel find alternate callback CPU pcrypt: remove padata cpumask notifier padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible padata: use separate workqueues for parallel and serial work padata: unbind parallel jobs from specific CPUs padata: remove cpu_index from the parallel_queue Documentation/padata.txt | 12 +-- crypto/pcrypt.c | 167 ++++------------------------------- include/linux/padata.h | 17 ++-- include/linux/workqueue.h | 4 + kernel/padata.c | 180 ++++++++++++++++++++++---------------- kernel/workqueue.c | 25 ++++-- 6 files changed, 159 insertions(+), 246 deletions(-) base-commit: 0ecfebd2b52404ae0c54a878c872bb93363ada36 prerequisite-patch-id: a5bfed8ea60d5a784b8b3e21ccb5657ced2aa1e3 prerequisite-patch-id: 2253fd446f550ba17dcd29e2ab819eec080882b7 prerequisite-patch-id: 5b54f4083ca2f1f36726fe9453ee333966506ba3 prerequisite-patch-id: 73cefa748271f8d7417f21f4277efe13bbfaa8a2 prerequisite-patch-id: 99803e56a3016db4555f27b12a19d3504fd1b6b7 prerequisite-patch-id: 965d8a63c1461f00219aec2d817f2ca85d49cfb3 prerequisite-patch-id: 8e6c2988331b46c9467ac568157c6c575cbe6578 prerequisite-patch-id: 39df88ce1e07d318cf51f5c16fba03ff477c945e prerequisite-patch-id: 90b1e5bac841672d405f8f649aac7952eddd6f43 prerequisite-patch-id: 69d3bd9cdda2ba00c5c2d16d0757d8c16eabcd54 -- 2.22.0