public inbox for dm-crypt@saout.de
 help / color / mirror / Atom feed
From: Matthias Schniedermeyer <ms@citd.de>
To: David Niklas <doark@mail.com>
Cc: dm-crypt@saout.de
Subject: Re: [dm-crypt] Streaming ciphers
Date: Mon, 17 Feb 2020 11:49:19 +0100	[thread overview]
Message-ID: <20200217104919.GA11836@citd.de> (raw)
In-Reply-To: <20200216225622.1330f0aa@Phenom-II-x6.niklas.com>

On 16.02.2020 22:56, David Niklas wrote:
> Yuck, top post. Reformat and reply.
> 
> On Sun, 16 Feb 2020 14:58:10 +0100
> Matthias Schniedermeyer <ms@citd.de> wrote:
> > > On Sun, Feb 16, 2020 at 01:59:41 CET, David Niklas wrote:
> > > > Hello,
> > > > Today I was helping a poor luser who's Crucial P1 QLC SSD died from
> > > > too many writes. We still don't know what's doing the writing, but
> > > > he is running luks using FDE so write amplification is definitely a
> > > > factor.
> > > > I forget the answer to this so please enlighten me, is there a
> > > > streaming cypher he can use instead of a block cipher? A better
> > > > option that I didn't consider?
> > > > Not that the TCG Opal is to be fully trusted (nor is it available on
> > > > that model), but how does it work with respect to write
> > > > amplification vs. luks?
> > > >
> > > > Thanks,
> > > > David
> > On 16.02.2020 03:32, Arno Wagner wrote:
> > > Hi David,
> > >
> > > using LUKS should not result in write-amplification.
> > > LUKS uses 512B blocks and just provides an 1:1 mapping.
> >
> > Using defaults it does cause a higher write-amplification.
> > By default dm-crypt doesn't not enable discard-support, whereas it is
> > normaly supported for an unencrypted filesystem.
> >
> > And given that at least some distributions even install a
> > fstrim-cronjob, the filesystems are trimmed, even if not mounted with
> > the discard-option.
> >
> > This results in an unencrypted filesystem having it's empty space
> > "empty", as far as the SSD is concerned.
> > Wheras "empty" space (either "is" or "stays") "used" for a LUKS device.
> >
> > The "is" or "stays" difference comes with having the encrypted device
> > pre-inited or not. With pre-init the blocks are always "in use".
> > Without pre-init the blocks are "unused" as long as they aren't written
> > and switch to "in use" after first beeing written, after which they
> > will stay "in use" forever.
> >
> > Less "empty" space results in higher write-amplification because the
> > SSD has to remap "empty" space as it is "in use", as far as the SSD is
> > concerned.
> >
> > A pre-inited encrypted device, in this scenario, never has any empty
> > space.
> >
> >
> > I'm not saying that you can't make it equivalent, just that there are
> > differences when using the defaults.
> 
> Thanks! I understand.
> Is there anything else I should be aware of (aside from a kernel option I
> need to look up again to delay writing to disk), that will lessen disk
> writes/amplification from luks?

If you don't have a "SSD killing write load" (at least hundreth's of GB/s 
per day) you normaly don't have to worry about killing any halfway recent SSD.

Of course you can always have bad luck. I personally had 2 enterprise 
SSDs die on me @work, both after only a few weeks in production.
(IOW "Infant Death" category)

But i've no personal experience with "very recent" QLC drives.
QLC drives are expected to have an even lower Write Endurance than TLCs.

Given that the Crucial P1 appears to have entered the market just over a 
years ago it is a quite recent drive.

The 1TB drive is listed with an endurance of 200TB and 5 year warranty.
That makes about 110GB per day, or about 0.11 DWPD.

So i would guess that meantioned drive is less than 1 year old.

Unless you had written to the SSD in excess of 600GB per day continously 
since it was bought, it was likely more because of "bad luck" that the 
SSD died.




-- 

Matthias

      reply	other threads:[~2020-02-17 10:49 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-02-16  0:59 [dm-crypt] Streaming ciphers David Niklas
2020-02-16  2:32 ` Arno Wagner
2020-02-16 13:58   ` Matthias Schniedermeyer
2020-02-17  3:56     ` David Niklas
2020-02-17 10:49       ` Matthias Schniedermeyer [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20200217104919.GA11836@citd.de \
    --to=ms@citd.de \
    --cc=dm-crypt@saout.de \
    --cc=doark@mail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox