Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp2621753ybl; Thu, 29 Aug 2019 10:34:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqww1Vm86P50n5mjBdb4kBbE6cPU6e83pMs2DYaUrVym6o/xvGUSP6MrholYXK+bRwmD+qff X-Received: by 2002:a17:902:7c10:: with SMTP id x16mr10877257pll.181.1567100089995; Thu, 29 Aug 2019 10:34:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567100089; cv=none; d=google.com; s=arc-20160816; b=aBjIQfx4ZXTVb8rKWbVJAbNvzeLG92Gnau4s8fxoSTKjdDR6PsmitV8sTwxVr2haFO xe0j54C6+SH+QZ9aFLRgw/zfEnx/ldPWe5E/e7W1Jd9qnCL08n8hDJoDa27meWMpbqMF K/4fLNuSUhv0XKyNQjB6dzMGtaIhJrBKXcV4WEKhm7m5wVY7WjMvV8zb4aWSnTk9RPVi T/h1B0G59vU6dlGuf80B8mUFjCkm/+vh2ySKOEUhbhmvq7XcYezHZi2h2+NMyghBS+W8 6LjtZ4Pp3sME7VXrUEPJuAPnfdZQfLNgUUPcOZy2r25Iq01sIUgDajaEmssHcX10cQsv J2MQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=LfkFY4XIlM76DXVCiosr404r4HM6SyOqKdtpTCH6iow=; b=mUn5R2Rh2+pnoOK9CZI+7IqnrBD8aORjxB0K8VdgOkd/WOK/rlWGowrMkNPmU/1PF1 NG0ARyiCMWXQFLtEAIpJbW8868CpSrhhtrNFaOF3ckVU5ZLXQ3xWDVSHDLmyxjvC50M0 dAi4yFujrDZbHM8M29e+laUnxoX+bT3k8/06BM04n0P/9Wi/7mnL/C45W73IGqTJhY2D 5NJpM1lovl0XS66v0lnsUyUL846DkIY4iitfhh8iK/PlGLyfsKweLBhOUc54bDd7rKjA NuxJxiKwWP0pa1RuoVQ+9KOPGUtQ+qdR5o51f/dZBzsug0XU3vsdSpJXFbpmbhvh5igy ljIQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2019-08-05 header.b=HQadhb9m; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n123si2602200pgn.151.2019.08.29.10.34.33; Thu, 29 Aug 2019 10:34:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2019-08-05 header.b=HQadhb9m; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728081AbfH2RdC (ORCPT + 99 others); Thu, 29 Aug 2019 13:33:02 -0400 Received: from userp2130.oracle.com ([156.151.31.86]:44568 "EHLO userp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727800AbfH2Rc6 (ORCPT ); Thu, 29 Aug 2019 13:32:58 -0400 Received: from pps.filterd (userp2130.oracle.com [127.0.0.1]) by userp2130.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x7THTYek121147; Thu, 29 Aug 2019 17:32:40 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : mime-version : content-transfer-encoding; s=corp-2019-08-05; bh=LfkFY4XIlM76DXVCiosr404r4HM6SyOqKdtpTCH6iow=; b=HQadhb9mcv4A7anvQxIvsVMN+0yZTTIDYZ3KacYY+g6lAnTRsN5RVbinRmPoM9Kl3tOS WAOhy/0RHHLqNONaOdfLjot80i6qKHxIVD61FdwJSLR2IJ+dKG8OXfnhL0NlCXMfSRNg nqEEx1DWDTdxZm7HEKqxTOg8bNmo9Bi/YnL4kmM/6J2rAGV1ZxAJy8tdlF2HdbO3HNJF KDYUBZe+RkAeW5NTGRo6HOYN/nkc8JuNZsr0O9170VwUEs/3xFd15ooiFe13KV1+SJ1T 13tuODXgLk3eDNTh9o6wac31afH4TWGSN/IVPfOWoqvgQCZBajME736WR/WSbNWnXNyq OQ== Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80]) by userp2130.oracle.com with ESMTP id 2upk56r0qx-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 29 Aug 2019 17:32:40 +0000 Received: from pps.filterd (userp3030.oracle.com [127.0.0.1]) by userp3030.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x7THWbVQ008176; Thu, 29 Aug 2019 17:32:39 GMT Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by userp3030.oracle.com with ESMTP id 2unvu0b2bn-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 29 Aug 2019 17:32:38 +0000 Received: from abhmp0008.oracle.com (abhmp0008.oracle.com [141.146.116.14]) by aserv0122.oracle.com (8.14.4/8.14.4) with ESMTP id x7THWa8p015164; Thu, 29 Aug 2019 17:32:36 GMT Received: from zissou.us.oracle.com (/10.152.34.58) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 29 Aug 2019 10:32:36 -0700 From: Daniel Jordan To: Herbert Xu , Steffen Klassert Cc: Lai Jiangshan , Peter Zijlstra , Tejun Heo , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Daniel Jordan Subject: [PATCH v2 0/9] padata: use unbound workqueues for parallel jobs Date: Thu, 29 Aug 2019 13:30:29 -0400 Message-Id: <20190829173038.21040-1-daniel.m.jordan@oracle.com> X-Mailer: git-send-email 2.23.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9364 signatures=668685 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1906280000 definitions=main-1908290186 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9364 signatures=668685 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1906280000 definitions=main-1908290185 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, Everything in the Testing section has been rerun after the suggestion from Herbert last round. Thanks again to Steffen for giving this a run. Any comments welcome. Daniel v1[*] -> v2: - Updated patch 8 to avoid queueing the reorder work if the next object by sequence number isn't ready yet (Herbert) - Added Steffen's ack to all but patch 8 since that one changed. RFC[**] -> v1: - Included Tejun's acks. - Added testing section to cover letter. Padata binds the parallel part of a job to a single CPU and round-robins over all CPUs in the system for each successive job. Though the serial parts rely on per-CPU queues for correct ordering, they're not necessary for parallel work, and it improves performance to run the job locally on NUMA machines and let the scheduler pick the CPU within a node on a busy system. This series makes parallel padata jobs run on unbound workqueues. Patch Description ----- ----------- 1 Make a padata instance allocate its workqueue internally. 2 Unconfine some recently-confined workqueue interfaces. 3-6 Address recursive CPU hotplug locking issue. padata_alloc* requires its callers to hold this lock, but allocating an unbound workqueue and calling apply_workqueue_attrs also take it. Fix by removing the requirement for callers of padata_alloc*. 7-8 Add a second workqueue for each padata instance that's dedicated to parallel jobs. 9 Small cleanup. Performance ----------- Measurements are from a 2-socket, 20-core, 40-CPU Xeon server. For repeatability, modprobe was bound to a CPU and the serial cpumasks for both pencrypt and pdecrypt were also restricted to a CPU different from modprobe's. # modprobe tcrypt alg="pcrypt(rfc4106(gcm(aes)))" type=3 # modprobe tcrypt mode=211 sec=1 # modprobe tcrypt mode=215 sec=1 Busy system (tcrypt run while 10 stress-ng tasks were burning 100% CPU) base test ---------------- --------------- speedup key_sz blk_sz ops/sec stdev ops/sec stdev (pcrypt(rfc4106-gcm-aesni)) encryption (tcrypt mode=211) 117.2x 160 16 960 30 112555 24775 135.1x 160 64 845 246 114145 25124 113.2x 160 256 993 17 112395 24714 111.3x 160 512 1000 0 111252 23755 110.0x 160 1024 983 16 108153 22374 104.2x 160 2048 985 22 102563 20530 98.5x 160 4096 998 3 98346 18777 86.2x 160 8192 1000 0 86173 14480 (pcrypt(rfc4106-gcm-aesni)) decryption (tcrypt mode=211) 127.2x 160 16 997 5 126834 24244 128.4x 160 64 1000 0 128438 23261 127.6x 160 256 992 7 126627 23493 124.0x 160 512 1000 0 123958 22746 122.8x 160 1024 989 20 121372 22632 112.8x 160 2048 998 3 112602 18287 106.9x 160 4096 994 10 106255 16111 91.7x 160 8192 1000 0 91742 11670 multibuffer (pcrypt(rfc4106-gcm-aesni)) encryption (tcrypt mode=215) 242.2x 160 16 2363 141 572189 16846 242.1x 160 64 2397 151 580424 11923 231.1x 160 256 2472 21 571387 16364 237.6x 160 512 2429 24 577264 8692 238.3x 160 1024 2384 97 568155 6621 216.3x 160 2048 2453 74 530627 3480 209.2x 160 4096 2381 206 498192 19177 176.5x 160 8192 2323 157 410013 9903 multibuffer (pcrypt(rfc4106-gcm-aesni)) decryption (tcrypt mode=215) 220.3x 160 16 2341 228 515733 91317 216.6x 160 64 2467 33 534381 101262 217.7x 160 256 2451 45 533443 85418 213.8x 160 512 2485 26 531293 83767 211.0x 160 1024 2472 28 521677 80339 200.8x 160 2048 2459 67 493808 63587 188.8x 160 4096 2491 9 470325 58055 159.9x 160 8192 2459 51 393147 25756 Idle system (tcrypt run by itself) base test ---------------- --------------- speedup key_sz blk_sz ops/sec stdev ops/sec stdev (pcrypt(rfc4106-gcm-aesni)) encryption (tcrypt mode=211) 2.5x 160 16 63412 43075 161615 1034 4.1x 160 64 39554 24006 161653 981 6.0x 160 256 26504 1436 160110 1158 6.2x 160 512 25500 40 157018 951 5.9x 160 1024 25777 1094 151852 915 5.8x 160 2048 24653 218 143756 508 5.6x 160 4096 24333 20 136752 548 5.0x 160 8192 23310 15 117660 481 (pcrypt(rfc4106-gcm-aesni)) decryption (tcrypt mode=211) 2.4x 160 16 53471 48279 128047 31328 3.4x 160 64 37712 20855 128187 31074 4.5x 160 256 27911 4378 126430 31084 4.9x 160 512 25346 175 123870 29099 3.1x 160 1024 38452 23118 120817 26846 4.7x 160 2048 24612 187 115036 23942 4.5x 160 4096 24217 114 109583 21559 4.2x 160 8192 23144 108 96850 16686 multibuffer (pcrypt(rfc4106-gcm-aesni)) encryption (tcrypt mode=215) 1.0x 160 16 412157 3855 426973 1591 1.0x 160 64 412600 4410 431920 4224 1.1x 160 256 410352 3254 453691 17831 1.2x 160 512 406293 4948 473491 39818 1.2x 160 1024 395123 7804 478539 27660 1.2x 160 2048 385144 7601 453720 17579 1.2x 160 4096 371989 3631 449923 15331 1.2x 160 8192 346723 1617 399824 18559 multibuffer (pcrypt(rfc4106-gcm-aesni)) decryption (tcrypt mode=215) 1.1x 160 16 407317 1487 452619 14404 1.1x 160 64 411821 4261 464059 23541 1.2x 160 256 408941 4945 477483 36576 1.2x 160 512 406451 611 472661 11038 1.2x 160 1024 394813 2667 456357 11452 1.2x 160 2048 390291 4175 448928 8957 1.2x 160 4096 371904 1068 449344 14225 1.2x 160 8192 344227 1973 404397 19540 Testing ------- In addition to the bare metal performance runs above, this series was tested in a kvm guest with the tcrypt module (mode=215). All combinations of CPUs among parallel_cpumask, serial_cpumask, and CPU hotplug online/offline were run with 3 possible CPUs, and over 2000 random combinations of these were run with 8 possible CPUs. Workqueue events were used throughout to verify that all parallel and serial workers executed on only the CPUs allowed by the cpumask sysfs files. Finally, tcrypt mode=215 was run at each patch in the series when built with and without CONFIG_PADATA/CONFIG_CRYPTO_PCRYPT. Dependencies ------------ Based on recent mainline plus padata fixes in cryptodev and [***]. Branch available at git://oss.oracle.com/git/linux-dmjordan.git padata-unbound-wq-v2 [*] https://lore.kernel.org/linux-crypto/20190813005224.30779-1-daniel.m.jordan@oracle.com/ [**] https://lore.kernel.org/lkml/20190725212505.15055-1-daniel.m.jordan@oracle.com/ [***] https://lore.kernel.org/linux-crypto/20190828221425.22701-1-daniel.m.jordan@oracle.com/ Daniel Jordan (9): padata: allocate workqueue internally workqueue: unconfine alloc/apply/free_workqueue_attrs() workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs padata: make padata_do_parallel find alternate callback CPU pcrypt: remove padata cpumask notifier padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible padata: use separate workqueues for parallel and serial work padata: unbind parallel jobs from specific CPUs padata: remove cpu_index from the parallel_queue Documentation/padata.txt | 12 +-- crypto/pcrypt.c | 167 ++++---------------------------- include/linux/padata.h | 16 +-- include/linux/workqueue.h | 4 + kernel/padata.c | 199 ++++++++++++++++++++++---------------- kernel/workqueue.c | 25 +++-- 6 files changed, 169 insertions(+), 254 deletions(-) base-commit: d1abaeb3be7b5fa6d7a1fbbd2e14e3310005c4c1 prerequisite-patch-id: a5bfed8ea60d5a784b8b3e21ccb5657ced2aa1e3 prerequisite-patch-id: 96d53aecccb5af242ba5ee342d75810ecd9bfb84 prerequisite-patch-id: 965d8a63c1461f00219aec2d817f2ca85d49cfb3 prerequisite-patch-id: 8e6c2988331b46c9467ac568157c6c575cbe6578 prerequisite-patch-id: d986726d45a212e6d8b20a0a5d29ca0bb3ae7f40 prerequisite-patch-id: e4a766ec476731ab1a4062f5180022ed323545c8 prerequisite-patch-id: 716acf8056642d70588b02fbd870c51373efeeef prerequisite-patch-id: ddaf35059410f7e9225f0b330e85a422aa7c21cd prerequisite-patch-id: 5e11bce8e61bbe5bcf467d29b5714844c9347488 -- 2.23.0