ff2038a9bf
Right now, aesni_cipher_alloc does a bit of special-casing for CRYPTO_F_IOV, to not do any allocation if the first uio is large enough for the requested size. While working on ZFS crypto port, I ran into horrible performance because the code uses scatter-gather, and many of the times the data to encrypt was in the second entry. This code looks through the list, and tries to see if there is a single uio that can contain the requested data, and, if so, uses that. This has a slight impact on the current consumers, in that the check is a little more complicated for the ones that use CRYPTO_F_IOV -- but none of them meet the criteria for testing more than one. Submitted by: sef at ixsystems.com Reviewed by: cem@ MFC after: 3 days Sponsored by: iX Systems Differential Revision: https://reviews.freebsd.org/D18522
296 lines
6.9 KiB
C
296 lines
6.9 KiB
C
/* $OpenBSD: criov.c,v 1.9 2002/01/29 15:48:29 jason Exp $ */
|
|
|
|
/*-
|
|
* Copyright (c) 1999 Theo de Raadt
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. The name of the author may not be used to endorse or promote products
|
|
* derived from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/systm.h>
|
|
#include <sys/proc.h>
|
|
#include <sys/errno.h>
|
|
#include <sys/malloc.h>
|
|
#include <sys/kernel.h>
|
|
#include <sys/mbuf.h>
|
|
#include <sys/uio.h>
|
|
#include <sys/limits.h>
|
|
#include <sys/lock.h>
|
|
|
|
#include <opencrypto/cryptodev.h>
|
|
|
|
/*
|
|
* This macro is only for avoiding code duplication, as we need to skip
|
|
* given number of bytes in the same way in three functions below.
|
|
*/
|
|
#define CUIO_SKIP() do { \
|
|
KASSERT(off >= 0, ("%s: off %d < 0", __func__, off)); \
|
|
KASSERT(len >= 0, ("%s: len %d < 0", __func__, len)); \
|
|
while (off > 0) { \
|
|
KASSERT(iol >= 0, ("%s: empty in skip", __func__)); \
|
|
if (off < iov->iov_len) \
|
|
break; \
|
|
off -= iov->iov_len; \
|
|
iol--; \
|
|
iov++; \
|
|
} \
|
|
} while (0)
|
|
|
|
void
|
|
cuio_copydata(struct uio* uio, int off, int len, caddr_t cp)
|
|
{
|
|
struct iovec *iov = uio->uio_iov;
|
|
int iol = uio->uio_iovcnt;
|
|
unsigned count;
|
|
|
|
CUIO_SKIP();
|
|
while (len > 0) {
|
|
KASSERT(iol >= 0, ("%s: empty", __func__));
|
|
count = min(iov->iov_len - off, len);
|
|
bcopy(((caddr_t)iov->iov_base) + off, cp, count);
|
|
len -= count;
|
|
cp += count;
|
|
off = 0;
|
|
iol--;
|
|
iov++;
|
|
}
|
|
}
|
|
|
|
void
|
|
cuio_copyback(struct uio* uio, int off, int len, c_caddr_t cp)
|
|
{
|
|
struct iovec *iov = uio->uio_iov;
|
|
int iol = uio->uio_iovcnt;
|
|
unsigned count;
|
|
|
|
CUIO_SKIP();
|
|
while (len > 0) {
|
|
KASSERT(iol >= 0, ("%s: empty", __func__));
|
|
count = min(iov->iov_len - off, len);
|
|
bcopy(cp, ((caddr_t)iov->iov_base) + off, count);
|
|
len -= count;
|
|
cp += count;
|
|
off = 0;
|
|
iol--;
|
|
iov++;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Return the index and offset of location in iovec list.
|
|
*/
|
|
int
|
|
cuio_getptr(struct uio *uio, int loc, int *off)
|
|
{
|
|
int ind, len;
|
|
|
|
ind = 0;
|
|
while (loc >= 0 && ind < uio->uio_iovcnt) {
|
|
len = uio->uio_iov[ind].iov_len;
|
|
if (len > loc) {
|
|
*off = loc;
|
|
return (ind);
|
|
}
|
|
loc -= len;
|
|
ind++;
|
|
}
|
|
|
|
if (ind > 0 && loc == 0) {
|
|
ind--;
|
|
*off = uio->uio_iov[ind].iov_len;
|
|
return (ind);
|
|
}
|
|
|
|
return (-1);
|
|
}
|
|
|
|
/*
|
|
* Apply function f to the data in an iovec list starting "off" bytes from
|
|
* the beginning, continuing for "len" bytes.
|
|
*/
|
|
int
|
|
cuio_apply(struct uio *uio, int off, int len, int (*f)(void *, void *, u_int),
|
|
void *arg)
|
|
{
|
|
struct iovec *iov = uio->uio_iov;
|
|
int iol = uio->uio_iovcnt;
|
|
unsigned count;
|
|
int rval;
|
|
|
|
CUIO_SKIP();
|
|
while (len > 0) {
|
|
KASSERT(iol >= 0, ("%s: empty", __func__));
|
|
count = min(iov->iov_len - off, len);
|
|
rval = (*f)(arg, ((caddr_t)iov->iov_base) + off, count);
|
|
if (rval)
|
|
return (rval);
|
|
len -= count;
|
|
off = 0;
|
|
iol--;
|
|
iov++;
|
|
}
|
|
return (0);
|
|
}
|
|
|
|
void
|
|
crypto_copyback(int flags, caddr_t buf, int off, int size, c_caddr_t in)
|
|
{
|
|
|
|
if ((flags & CRYPTO_F_IMBUF) != 0)
|
|
m_copyback((struct mbuf *)buf, off, size, in);
|
|
else if ((flags & CRYPTO_F_IOV) != 0)
|
|
cuio_copyback((struct uio *)buf, off, size, in);
|
|
else
|
|
bcopy(in, buf + off, size);
|
|
}
|
|
|
|
void
|
|
crypto_copydata(int flags, caddr_t buf, int off, int size, caddr_t out)
|
|
{
|
|
|
|
if ((flags & CRYPTO_F_IMBUF) != 0)
|
|
m_copydata((struct mbuf *)buf, off, size, out);
|
|
else if ((flags & CRYPTO_F_IOV) != 0)
|
|
cuio_copydata((struct uio *)buf, off, size, out);
|
|
else
|
|
bcopy(buf + off, out, size);
|
|
}
|
|
|
|
int
|
|
crypto_apply(int flags, caddr_t buf, int off, int len,
|
|
int (*f)(void *, void *, u_int), void *arg)
|
|
{
|
|
int error;
|
|
|
|
if ((flags & CRYPTO_F_IMBUF) != 0)
|
|
error = m_apply((struct mbuf *)buf, off, len, f, arg);
|
|
else if ((flags & CRYPTO_F_IOV) != 0)
|
|
error = cuio_apply((struct uio *)buf, off, len, f, arg);
|
|
else
|
|
error = (*f)(arg, buf + off, len);
|
|
return (error);
|
|
}
|
|
|
|
int
|
|
crypto_mbuftoiov(struct mbuf *mbuf, struct iovec **iovptr, int *cnt,
|
|
int *allocated)
|
|
{
|
|
struct iovec *iov;
|
|
struct mbuf *m, *mtmp;
|
|
int i, j;
|
|
|
|
*allocated = 0;
|
|
iov = *iovptr;
|
|
if (iov == NULL)
|
|
*cnt = 0;
|
|
|
|
m = mbuf;
|
|
i = 0;
|
|
while (m != NULL) {
|
|
if (i == *cnt) {
|
|
/* we need to allocate a larger array */
|
|
j = 1;
|
|
mtmp = m;
|
|
while ((mtmp = mtmp->m_next) != NULL)
|
|
j++;
|
|
iov = malloc(sizeof *iov * (i + j), M_CRYPTO_DATA,
|
|
M_NOWAIT);
|
|
if (iov == NULL)
|
|
return ENOMEM;
|
|
*allocated = 1;
|
|
*cnt = i + j;
|
|
memcpy(iov, *iovptr, sizeof *iov * i);
|
|
}
|
|
|
|
iov[i].iov_base = m->m_data;
|
|
iov[i].iov_len = m->m_len;
|
|
|
|
i++;
|
|
m = m->m_next;
|
|
}
|
|
|
|
if (*allocated)
|
|
KASSERT(*cnt == i, ("did not allocate correct amount: %d != %d",
|
|
*cnt, i));
|
|
|
|
*iovptr = iov;
|
|
*cnt = i;
|
|
return 0;
|
|
}
|
|
|
|
static inline void *
|
|
m_contiguous_subsegment(struct mbuf *m, size_t skip, size_t len)
|
|
{
|
|
int rel_off;
|
|
|
|
MPASS(skip <= INT_MAX);
|
|
|
|
m = m_getptr(m, (int)skip, &rel_off);
|
|
if (m == NULL)
|
|
return (NULL);
|
|
|
|
MPASS(rel_off >= 0);
|
|
skip = rel_off;
|
|
if (skip + len > m->m_len)
|
|
return (NULL);
|
|
|
|
return (mtod(m, char*) + skip);
|
|
}
|
|
|
|
static inline void *
|
|
cuio_contiguous_segment(struct uio *uio, size_t skip, size_t len)
|
|
{
|
|
int rel_off, idx;
|
|
|
|
MPASS(skip <= INT_MAX);
|
|
idx = cuio_getptr(uio, (int)skip, &rel_off);
|
|
if (idx < 0)
|
|
return (NULL);
|
|
|
|
MPASS(rel_off >= 0);
|
|
skip = rel_off;
|
|
if (skip + len > uio->uio_iov[idx].iov_len)
|
|
return (NULL);
|
|
return ((char *)uio->uio_iov[idx].iov_base + skip);
|
|
}
|
|
|
|
void *
|
|
crypto_contiguous_subsegment(int crp_flags, void *crpbuf,
|
|
size_t skip, size_t len)
|
|
{
|
|
if ((crp_flags & CRYPTO_F_IMBUF) != 0)
|
|
return (m_contiguous_subsegment(crpbuf, skip, len));
|
|
else if ((crp_flags & CRYPTO_F_IOV) != 0)
|
|
return (cuio_contiguous_segment(crpbuf, skip, len));
|
|
else {
|
|
MPASS((crp_flags & (CRYPTO_F_IMBUF | CRYPTO_F_IOV)) !=
|
|
(CRYPTO_F_IMBUF | CRYPTO_F_IOV));
|
|
return ((char*)crpbuf + skip);
|
|
}
|
|
}
|
|
|