From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0130.outbound.protection.outlook.com [207.46.100.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mail.server123.net (Postfix) with ESMTPS for ; Thu, 6 Aug 2015 14:25:25 +0200 (CEST) Message-ID: <55C34EAF.2060609@freescale.com> Date: Thu, 6 Aug 2015 15:10:23 +0300 From: Vasile Catalin-B50542 MIME-Version: 1.0 References: <55C3060B.6030206@freescale.com> <55C325AE.6070604@gmail.com> <55C33919.40101@freescale.com> <55C342C2.3090800@tu-ilmenau.de> <55C345CA.90101@freescale.com> <55C34972.9020007@gmail.com> In-Reply-To: <55C34972.9020007@gmail.com> Content-Type: multipart/alternative; boundary="------------070602010904030407090300" Subject: Re: [dm-crypt] out of order encryption List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Milan Broz Cc: Lars Winterfeld , dm-crypt@saout.de --------------070602010904030407090300 Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 7bit I am using a Freescale P3041DS platform with CAAM (drivers/crypto/CAAM/*) hardware accelerator. The platforms is a PowerPC processor. On 06.08.2015 14:48, Milan Broz wrote: > On 08/06/2015 01:32 PM, Vasile Catalin-B50542 wrote: >> I am sending crypto requests to a hardware component which has >> an option to keeping them in order or not. I was trying to use the out of >> order option because this would let requests run in parallel. >> If I tried running them with the out of order option bun then I get: >> No key available with this passphrase. >> When trying to execute the following commands: >> cryptsetup -c aes-xts-plain -y -v luksFormat /dev/sda1 >> cryptsetup open /dev/sda1 test_xts1 > > Sigh. Please when you asking about some explicit problem, please > always mention it from the beginning... > > So this is probably unrelated to dmcrypt. Userspace cryptsetup could use > kernel crypto API wrapper directly (add --debug and you will see, > there should be log message that it uses kernel crypto userspace interface). > > This seems like a bug in the kernel crypto API provider, what exactly it is? > What architecture? > > We have seen the same problem with Raspbery PI2 & NEON crypto driver > (it was a bug in kernel code), I guess it is the same here. > > Milan > >> On 06.08.2015 14:19, Lars Winterfeld wrote: >>> Am 06.08.2015 um 12:38 schrieb Vasile Catalin-B50542: >>>> Does the underlying encryption layer (CryptoAPI) have to ensure the >>>> complete callbacks are called in the order the requests were submitted? >>> Are you thinking about parallelization or asynchronous processing? >>> >> >> _______________________________________________ >> dm-crypt mailing list >> dm-crypt@saout.de >> http://www.saout.de/mailman/listinfo/dm-crypt >> -- CatalinVasile Intern, DN-Software FreescaleSemiconductor, Inc. www.freescale.com phone: 073-021-1938 e-mail: catalin.vasile@freescale.com *Freescale_Logo-nosemi_Lh_4c*** This e-mail, and any associated attachments have been classified as: [ ] Public [ ] Freescale Semiconductor Internal Use Only [ ] Freescale Semiconductor Confidential Proprietary --------------070602010904030407090300 Content-Type: multipart/related; boundary="------------030702020907050601000404" --------------030702020907050601000404 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: 7bit I am using a Freescale P3041DS platform with CAAM (drivers/crypto/CAAM/*) hardware accelerator.
The platforms is a PowerPC processor.

On 06.08.2015 14:48, Milan Broz wrote:
On 08/06/2015 01:32 PM, Vasile Catalin-B50542 wrote:
I am sending crypto requests to a hardware component which has
an option to keeping them in order or not. I was trying to use the out of
order option because this would let requests run in parallel.
If I tried running them with the out of order option bun then I get:
No key available with this passphrase.
When trying to execute the following commands:
cryptsetup -c aes-xts-plain -y -v luksFormat /dev/sda1
cryptsetup open /dev/sda1 test_xts1

Sigh. Please when you asking about some explicit problem, please
always mention it from the beginning...

So this is probably unrelated to dmcrypt. Userspace cryptsetup could use
kernel crypto API wrapper directly (add --debug and you will see,
there should be log message that it uses kernel crypto userspace interface).

This seems like a bug in the kernel crypto API provider, what exactly it is?
What architecture?

We have seen the same problem with Raspbery PI2 & NEON crypto driver
(it was a bug in kernel code), I guess it is the same here.

Milan

On 06.08.2015 14:19, Lars Winterfeld wrote:
Am 06.08.2015 um 12:38 schrieb Vasile Catalin-B50542:
Does the underlying encryption layer (CryptoAPI) have to ensure the
complete callbacks are called in the order the requests were submitted?
Are you thinking about parallelization or asynchronous processing?


_______________________________________________
dm-crypt mailing list
dm-crypt@saout.de
http://www.saout.de/mailman/listinfo/dm-crypt


--

Catalin Vasile

Intern, DN-Software

Freescale Semiconductor, Inc.

www.freescale.com

phone: 073-021-1938

e-mail: catalin.vasile@freescale.com

Freescale_Logo-nosemi_Lh_4c

This e-mail, and any associated attachments have been classified as:

[ ] Public

[ ] Freescale Semiconductor Internal Use Only

[ ] Freescale Semiconductor Confidential Proprietary

--------------030702020907050601000404 Content-Type: image/gif; name="image002.gif" Content-Transfer-Encoding: base64 Content-ID: Content-Disposition: inline; filename="image002.gif" R0lGODlhwwBJAHcAMSH+GlNvZnR3YXJlOiBNaWNyb3NvZnQgT2ZmaWNlACH5BAEAAAAALBkA EACeACgAhwAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBmAABmMwBm ZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/MwD/ ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ ZjP/mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2Zm ZmZmmWZmzGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/ Zmb/mWb/zGb//5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lm ZplmmZlmzJlm/5mZAJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/ Zpn/mZn/zJn//8wAAMwAM8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xm ZsxmmcxmzMxm/8yZAMyZM8yZZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/ Zsz/mcz/zMz///8AAP8AM/8AZv8Amf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9m Zv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+ZzP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M/// Zv//mf//zP///wECAwECAwECAwECAwECAwECAwECAwECAwECAwECAwECAwECAwECAwECAwEC AwECAwECAwECAwECAwECAwECAwECAwECAwECAwECAwECAwECAwECAwECAwECAwECAwECAwEC AwECAwECAwECAwECAwECAwECAwj/AAEIHEiwIEFoBhMqXMiwocOHECNKnDgxGjRhyTxdi0ax o8ePIEOKHHhRmLBgJpNxHMmypcuXDFsBSIbskrBOwmwiQwizp8+fHZWZNIkyGLKdAp1Zuwa0 qVOn0UzinAqNJ4Bn1I5RU/q0q9eR2KAlOyls50przpo1c3ZsLQCmX+PKnQitlEBsz9I2O5aW rTNo2OYKHuzwmjO9atVyFTjWKuHHg6EdZrt360BTyYwGS5bMMeTPXtFScysw2liURIN5Bs36 KTWeY2/mvMm5te24pokO3Xy7t1dsymLbFBZtpe/jMK1Bg2uxrErk0FuG7essuvWezxIntna9 e0i0eylr/60OAFtg7+gdQhutXe0z7mE7K4t4Pv1xa3zzp10qsORmuwtdEcAVLLBwhX0dBRCA T9HAJVBeaz0zkFC6oWbcQK0IqKCCgiAoEQsbLvhSKWMVR9J7pdE01WyeQHOhQBpuyIKHEgki o3RikYVRZwWVVCFnqwHQCogKFjgjjQ8JEuOBLJWEk02XPFdQbDjxVl9BBG5okJJ3yYTlka14 qRCBd115V4cAkLmQIEdegWZBXqpp3kAFbvimQEPC+CaTYhLEGWq7JTMfAKuNhQwALw4UY5Ec AmAkC0oa+OajARTo5pZZgmhgn0JeIaCmkhYUKaiXDoSNp3VqWqpAIYo5aqVGBv+W4aoTJmPT isJYVU0zW3E3YUNEhqjgFUPKuKGXdQo74JsZKnsshsEKuymM0crI5KnVhqiotgIp6WyBQip5 p59DIZMMXOAldliQCWULq43KHumultsyKiyTWdobYpv7Jlspk8G6uSiT8FbabbwyjqsQNJ4k IxBTh+nH12JJEgkutTLWmWbCAiV7xXk3DsRtjGASCCmdG5aqaoefDohyo46m3HHKyMo8UXbt 8fqMgxBZPGnGccroqs3BCnJes40GzORd9Ro8kLjncRmmyPTG3OiSBAV7ZESGhcdXMxImWCRB +xJUsIGeshmy0mmH2KG0kLoZNccVV0u1guXtK66n3Db/FM152FiTrlLsNrQotCHP7GyIH88r bJiL6t3KqYknFFi+yhKs9+LSPjSWwwRZE7ZHWB9c5NIFc14pNo6P3LKygng77ELYqM0o5vim /LbqszPEGVnmthTwy06bXnxCtovoUOyalj38QgHXDPPwASv8UFm3zpaMmR4FK+bzxgfQZ6iK G0hQKwHcKUifyR8IPgCxd1i7zayOrXj6VuOPIYGc9jiUbJtRRqI8IrSmKQ9+jCtPh4h0IKS5 LFw+K9aMjHa/BbotdhsbEOsKmD/zAcBYGcTb5EJovVbYSjZUKQ9LUkeQ0hFvWdGSX7TQti/0 Mc5NWgtM6gbkrwORzE33QpPPeoQkrEhVriDK8A9GBOgSF+brZGbjHBTvl7nJRU5aaCrW4tC0 w8zByGYOjNfSFvY57onEYkurYUFq17wibQ1xlUrZGIektX+x73WwEhMdM1a6BHYLjyCy3nVa oaS0MaSQnuqfkAjpKWIpEn6FLGEkOxK7Rj4SSZikSEAAADs= --------------030702020907050601000404-- --------------070602010904030407090300--