From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [63.128.21.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mail.server123.net (Postfix) with ESMTPS for ; Fri, 25 Sep 2020 22:21:39 +0200 (CEST) Date: Fri, 25 Sep 2020 16:15:12 -0400 From: Mike Snitzer Message-ID: <20200925201512.GA6025@redhat.com> References: <20200924012732.GA10766@redhat.com> <20200924051419.GA16103@sol.localdomain> <252587bb-c0b7-47c9-a97b-91422f8f9c47@default> <7b6fdfd5-0160-4bcf-b7ed-d0e51553c678@default> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Subject: Re: [dm-crypt] [RFC PATCH 0/2] dm crypt: Allow unaligned buffer lengths for skcipher devices List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Sudhakar Panneerselvam Cc: Mike Christie , Damien Le Moal , Mikulas Patocka , "ssudhakarp@gmail.com" , "dm-crypt@saout.de" , Eric Biggers , "dm-devel@redhat.com" , Shirley Ma , Martin Petersen , Milan Broz , "agk@redhat.com" , linux-block@vger.kernel.org, linux-scsi@vger.kernel.org, mst@redhat.com On Thu, Sep 24 2020 at 9:09pm -0400, Damien Le Moal wrote: > On 2020/09/25 4:14, Sudhakar Panneerselvam wrote: > >> > >> On Thu, 24 Sep 2020, Sudhakar Panneerselvam wrote: > >> > >>>> By copying it to a temporary aligned buffer and issuing I/O on this > >>>> buffer. > >>> > >>> I don't like this idea. Because, you need to allocate additional pages > >>> for the entire I/O size(for the misaligned case, if you think through > >> > >> You can break the I/O to smaller pieces. You can use mempool for > >> pre-allocation of the pages. > > > > Assuming we do this, how is this code simpler(based on your > > comment below) than the fix in dm-crypt? In fact, this approach > > would make the code change look bad in vhost, at the same time > > having performance penalty. By doing this, we are just moving the > > responsibility to other unrelated component. > > Because vhost is at the top of the block-io food chain. Fixing the unaligned > segments there will ensure that it does not matter what device is under it. It > will work. Right, I agree. This should be addressed in vhost-scsi. And vhost-scsi probably needs to be interfacing through block core to submit IO that respects the limits of its underlying block device. So please lift your proposed dm-crypt changes to vhost-scsi: https://patchwork.kernel.org/patch/11781207/ https://patchwork.kernel.org/patch/11781053/ Maybe work with vhost-scsi maintainers to see about making the code reusable in block core; so that any future unaligned application IO is dealt in other drivers using the same common code. But I'm not interested in taking these changes into dm-crypt: NAK > I am still baffled that the unaligned segments go through in the first place... > Do we have something missing in the BIO code ? Cc'ing linux-block, could be. Thanks, Mike