Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp3887475ybv; Tue, 25 Feb 2020 09:04:44 -0800 (PST) X-Google-Smtp-Source: APXvYqwGgkYtBo5uMV5aKJxxqiDA3HdjoP0/TpscxVfWO5zKpg5WnnklU2MCY3/I8n56K34uYNAq X-Received: by 2002:a9d:600e:: with SMTP id h14mr43800862otj.113.1582650284108; Tue, 25 Feb 2020 09:04:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582650284; cv=none; d=google.com; s=arc-20160816; b=c8Vp+pPRAOINubHp2+D/FUgL13ssR3h+SSH5rPOzSuVxGAYwO/P6sk/u9E/rQbdKUd p3NfUfQApHnG8hDxDNsI9SySggzAOmOZ21My/1T9u3mCiGxuY++AFcus3rV7W8yuTupK d0o8BLnIwBk5Xr8JqE0o3P++nafVJuU0x6fzBJUUkm9S9YzM3RviILKPXENFe2TvKYPA 3JXhjgk8Z1wP/eLGweB0lbbNWE0oTn2B8swKGGtSnKgCDzmaLWv6lhG17C8OFtRRbKW/ GhIxWCW9plLsE4zBVqa1qdeZLXk4CSc0STp6lVG6f+4nZwSBRd+B9QPV+7YOTHadOVfX 5uPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature; bh=wS1PbqibE4MF1fawQo+Ot2izD7TmnCuaseHprLms+BA=; b=lDq2p6Kz4NfjJ4WGTe740L0nrhAclRuTKtjgzjzb6Ho3pWcrgckqj7OtHrE4I7wsEN grxxR8JoryBVjhmW71DbWXLRm63t1TfsVDMEx/jNCFq4WgP0uU9//yJsTfK86Iiu1kWR Ra3dIxXGvyV3aQN+3yV8EoUh7ji8hiRMLHQsKy0pMPLyDL/iL+j/kelpUxu4HxxOlGyX 5g35Lm7za6VtWFNJssEPfifpWdWqM1ccdVIFN2Y3bmvOQVrXygARYH3NRfpdnXYmcZes aBEaAH+KDKXmv0UQeQVPi79AWFem2q4IA4Eo26ZkHRbhITjEV+yJzSO39o5ybh7fq4gd Z4AA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=heSifKp2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b5si11035425ots.78.2020.02.25.09.04.30; Tue, 25 Feb 2020 09:04:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=heSifKp2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730990AbgBYQl6 (ORCPT + 99 others); Tue, 25 Feb 2020 11:41:58 -0500 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:28870 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728499AbgBYQl5 (ORCPT ); Tue, 25 Feb 2020 11:41:57 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1582648916; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=wS1PbqibE4MF1fawQo+Ot2izD7TmnCuaseHprLms+BA=; b=heSifKp2pS2xPu4gaV3Ovv9L7B9/fTGLlOMSnU2IuIj+/PJc8O2asx3s7QRoLsABxmpBlv sbtC2i1/++wmyd4OkxVmaTg0JWPk+bskIINGpZeLLrAV1h/9BmUwcK5mdYQJDT/cb4kl7W QxW9HgW9xm744Ah8WOPzCAIMwWK7BY4= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-99--ZvAYXfGNxKv_6nxVRKf1Q-1; Tue, 25 Feb 2020 11:41:52 -0500 X-MC-Unique: -ZvAYXfGNxKv_6nxVRKf1Q-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 2B53B18CA242; Tue, 25 Feb 2020 16:41:51 +0000 (UTC) Received: from file01.intranet.prod.int.rdu2.redhat.com (file01.intranet.prod.int.rdu2.redhat.com [10.11.5.7]) by smtp.corp.redhat.com (Postfix) with ESMTPS id D742790519; Tue, 25 Feb 2020 16:41:45 +0000 (UTC) Received: from file01.intranet.prod.int.rdu2.redhat.com (localhost [127.0.0.1]) by file01.intranet.prod.int.rdu2.redhat.com (8.14.4/8.14.4) with ESMTP id 01PGfjrV004485; Tue, 25 Feb 2020 11:41:45 -0500 Received: from localhost (mpatocka@localhost) by file01.intranet.prod.int.rdu2.redhat.com (8.14.4/8.14.4/Submit) with ESMTP id 01PGfjJ2004481; Tue, 25 Feb 2020 11:41:45 -0500 X-Authentication-Warning: file01.intranet.prod.int.rdu2.redhat.com: mpatocka owned process doing -bs Date: Tue, 25 Feb 2020 11:41:45 -0500 (EST) From: Mikulas Patocka X-X-Sender: mpatocka@file01.intranet.prod.int.rdu2.redhat.com To: Lukas Straub cc: linux-kernel , dm-devel , Mike Snitzer , Alasdair Kergon Subject: Re: [dm-devel] [PATCH] dm-integrity: Prevent RMW for full tag area writes In-Reply-To: <20200220190445.2222af54@luklap> Message-ID: References: <20200220190445.2222af54@luklap> User-Agent: Alpine 2.02 (LRH 1266 2009-07-14) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 20 Feb 2020, Lukas Straub wrote: > If a full tag area is being written, don't read it first. This prevents a > read-modify-write cycle and increases performance on HDDs considerably. > > To do this we now calculate the checksums for all sectors in the bio in one > go in integrity_metadata and then pass the result to dm_integrity_rw_tag, > which now checks if we overwrite the whole tag area. > > Benchmarking with a 5400RPM HDD with bitmap mode: > integritysetup format --no-wipe --batch-mode --interleave-sectors $((64*1024)) -t 4 -s 512 -I crc32c -B /dev/sdc > integritysetup open -I crc32c -B /dev/sdc hdda_integ > dd if=/dev/zero of=/dev/mapper/hdda_integ bs=64K count=$((16*1024*4)) conv=fsync oflag=direct status=progress > > Without patch: > 4294967296 bytes (4.3 GB, 4.0 GiB) copied, 400.326 s, 10.7 MB/s > > With patch: > 4294967296 bytes (4.3 GB, 4.0 GiB) copied, 41.2057 s, 104 MB/s > > Signed-off-by: Lukas Straub > --- > drivers/md/dm-integrity.c | 80 ++++++++++++++++++++++----------------- > 1 file changed, 46 insertions(+), 34 deletions(-) > > diff --git a/drivers/md/dm-integrity.c b/drivers/md/dm-integrity.c > index b225b3e445fa..0e5ddcf44935 100644 > --- a/drivers/md/dm-integrity.c > +++ b/drivers/md/dm-integrity.c > @@ -1309,9 +1309,16 @@ static int dm_integrity_rw_tag(struct dm_integrity_c *ic, unsigned char *tag, se > if (unlikely(r)) > return r; > > - data = dm_bufio_read(ic->bufio, *metadata_block, &b); > - if (IS_ERR(data)) > - return PTR_ERR(data); > + /* Don't read tag area from disk if we're going to overwrite it completely */ > + if (op == TAG_WRITE && *metadata_offset == 0 && total_size >= ic->metadata_run) { Hi This is incorrect logic because ic->metadata_run is in the units of 512-byte sectors and total_size is in bytes. If I correct the bug and change it to "if (op == TAG_WRITE && *metadata_offset == 0 && total_size >= ic->metadata_run << SECTOR_SHIFT)", then the benchmark doesn't show any performance advantage at all. You would need much bigger bios to take advantage for this - for example, if we have 4k block size and 64k metadata buffer size and 4-byte crc32, there are 65536/4=16384 tags in one metadata buffer and we would need 16384*4096=64MiB bio to completely overwrite the metadata buffer. Such big bios are not realistic. Mikulas > + data = dm_bufio_new(ic->bufio, *metadata_block, &b); > + if (IS_ERR(data)) > + return PTR_ERR(data); > + } else { > + data = dm_bufio_read(ic->bufio, *metadata_block, &b); > + if (IS_ERR(data)) > + return PTR_ERR(data); > + } > > to_copy = min((1U << SECTOR_SHIFT << ic->log2_buffer_sectors) - *metadata_offset, total_size); > dp = data + *metadata_offset; > @@ -1514,6 +1521,8 @@ static void integrity_metadata(struct work_struct *w) > { > struct dm_integrity_io *dio = container_of(w, struct dm_integrity_io, work); > struct dm_integrity_c *ic = dio->ic; > + unsigned sectors_to_process = dio->range.n_sectors; > + sector_t sector = dio->range.logical_sector; > > int r; > > @@ -1522,16 +1531,14 @@ static void integrity_metadata(struct work_struct *w) > struct bio_vec bv; > unsigned digest_size = crypto_shash_digestsize(ic->internal_hash); > struct bio *bio = dm_bio_from_per_bio_data(dio, sizeof(struct dm_integrity_io)); > - char *checksums; > + char *checksums, *checksums_ptr; > unsigned extra_space = unlikely(digest_size > ic->tag_size) ? digest_size - ic->tag_size : 0; > char checksums_onstack[HASH_MAX_DIGESTSIZE]; > - unsigned sectors_to_process = dio->range.n_sectors; > - sector_t sector = dio->range.logical_sector; > > if (unlikely(ic->mode == 'R')) > goto skip_io; > > - checksums = kmalloc((PAGE_SIZE >> SECTOR_SHIFT >> ic->sb->log2_sectors_per_block) * ic->tag_size + extra_space, > + checksums = kmalloc((dio->range.n_sectors >> ic->sb->log2_sectors_per_block) * ic->tag_size + extra_space, > GFP_NOIO | __GFP_NORETRY | __GFP_NOWARN); > if (!checksums) { > checksums = checksums_onstack; > @@ -1542,49 +1549,45 @@ static void integrity_metadata(struct work_struct *w) > } > } > > + checksums_ptr = checksums; > __bio_for_each_segment(bv, bio, iter, dio->orig_bi_iter) { > unsigned pos; > - char *mem, *checksums_ptr; > - > -again: > + char *mem; > mem = (char *)kmap_atomic(bv.bv_page) + bv.bv_offset; > pos = 0; > - checksums_ptr = checksums; > do { > integrity_sector_checksum(ic, sector, mem + pos, checksums_ptr); > - checksums_ptr += ic->tag_size; > - sectors_to_process -= ic->sectors_per_block; > + > + if (likely(checksums != checksums_onstack)) { > + checksums_ptr += ic->tag_size; > + } else { > + r = dm_integrity_rw_tag(ic, checksums, &dio->metadata_block, &dio->metadata_offset, > + ic->tag_size, !dio->write ? TAG_CMP : TAG_WRITE); > + if (unlikely(r)) > + goto internal_hash_error; > + } > + > pos += ic->sectors_per_block << SECTOR_SHIFT; > sector += ic->sectors_per_block; > - } while (pos < bv.bv_len && sectors_to_process && checksums != checksums_onstack); > + sectors_to_process -= ic->sectors_per_block; > + } while (pos < bv.bv_len && sectors_to_process); > kunmap_atomic(mem); > > - r = dm_integrity_rw_tag(ic, checksums, &dio->metadata_block, &dio->metadata_offset, > - checksums_ptr - checksums, !dio->write ? TAG_CMP : TAG_WRITE); > - if (unlikely(r)) { > - if (r > 0) { > - DMERR_LIMIT("Checksum failed at sector 0x%llx", > - (unsigned long long)(sector - ((r + ic->tag_size - 1) / ic->tag_size))); > - r = -EILSEQ; > - atomic64_inc(&ic->number_of_mismatches); > - } > - if (likely(checksums != checksums_onstack)) > - kfree(checksums); > - goto error; > - } > - > if (!sectors_to_process) > break; > + } > > - if (unlikely(pos < bv.bv_len)) { > - bv.bv_offset += pos; > - bv.bv_len -= pos; > - goto again; > + if (likely(checksums != checksums_onstack)) { > + r = dm_integrity_rw_tag(ic, checksums, &dio->metadata_block, &dio->metadata_offset, > + (dio->range.n_sectors >> ic->sb->log2_sectors_per_block) * ic->tag_size, > + !dio->write ? TAG_CMP : TAG_WRITE); > + if (unlikely(r)) { > + kfree(checksums); > + goto internal_hash_error; > } > + kfree(checksums); > } > > - if (likely(checksums != checksums_onstack)) > - kfree(checksums); > } else { > struct bio_integrity_payload *bip = dio->orig_bi_integrity; > > @@ -1615,6 +1618,13 @@ static void integrity_metadata(struct work_struct *w) > skip_io: > dec_in_flight(dio); > return; > +internal_hash_error: > + if (r > 0) { > + DMERR_LIMIT("Checksum failed at sector 0x%llx", > + (unsigned long long)(sector - ((r + ic->tag_size - 1) / ic->tag_size))); > + r = -EILSEQ; > + atomic64_inc(&ic->number_of_mismatches); > + } > error: > dio->bi_status = errno_to_blk_status(r); > dec_in_flight(dio); > @@ -3019,6 +3029,8 @@ static void dm_integrity_io_hints(struct dm_target *ti, struct queue_limits *lim > limits->physical_block_size = ic->sectors_per_block << SECTOR_SHIFT; > blk_limits_io_min(limits, ic->sectors_per_block << SECTOR_SHIFT); > } > + > + blk_limits_io_opt(limits, (1U << ic->sb->log2_interleave_sectors)); > } > > static void calculate_journal_section_size(struct dm_integrity_c *ic) > -- > 2.20.1 > > > -- > dm-devel mailing list > dm-devel@redhat.com > https://www.redhat.com/mailman/listinfo/dm-devel >