linux-crypto.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context]
       [not found]         ` <CAOtvUMcjULAOZYQ3K_XDvxcFoFJJjX-wxF6e6Y1+-r67tS_Y7g@mail.gmail.com>
@ 2017-05-10 14:45           ` Mike Snitzer
  2017-05-10 14:55             ` Gilad Ben-Yossef
  0 siblings, 1 reply; 4+ messages in thread
From: Mike Snitzer @ 2017-05-10 14:45 UTC (permalink / raw)
  To: Gilad Ben-Yossef
  Cc: Neeraj Soni, Christoph Hellwig, Keith Busch, dm-devel,
	Alasdair Kergon, Ondrej Mosnacek, Milan Broz, Herbert Xu,
	linux-crypto

On Wed, May 10 2017 at  9:37am -0400,
Gilad Ben-Yossef <gilad@benyossef.com> wrote:

> On Wed, May 10, 2017 at 11:49 AM, Neeraj Soni <neersoni@codeaurora.org> wrote:
> > Hi Keith,
> >
> > Request based dm (dm-req-crypt) is being used for Disk Encryption solution
> > in Android used by Google. Also as i mentioned reverting this fix  improves
> > the RR/RW numbers so this proves the request based dm is coming into path
> > and is being used.
> 
> Sadly, that is an out of tree module.
> 
> Does it still use Qcom specific APIs in its implementation (qcrypto_* funcs)?
> It did the last time I've checked - and the driver that implements
> those is not upstream either...
> 
> It makes it difficult to help - which is a shame since I am interested
> in enabling higher performance
> of dm-crypt when using HW based crypto transformation myself.

I have absolutely no interest in request-based dm-crypt.  It is a hack
to work-around limitations in crypto IV generation.

If "google" is foolish enough to deploy out-of-tree request-based
dm-crypt in their android kernel then they are easily capable of
reverting the commit in question to prop up their short-cited decision.

The correct way forward is to follow through with the crypto work
discussed here (pick a solution to implement and make it happen):
https://www.redhat.com/archives/dm-devel/2017-March/msg00044.html
and here:
https://www.redhat.com/archives/dm-devel/2017-March/msg00053.html
and here:
https://www.redhat.com/archives/dm-devel/2017-April/msg00132.html

Mike

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context]
  2017-05-10 14:45           ` need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context] Mike Snitzer
@ 2017-05-10 14:55             ` Gilad Ben-Yossef
  2017-05-11  5:52               ` Neeraj Soni
  0 siblings, 1 reply; 4+ messages in thread
From: Gilad Ben-Yossef @ 2017-05-10 14:55 UTC (permalink / raw)
  To: Mike Snitzer
  Cc: Neeraj Soni, Christoph Hellwig, Keith Busch, dm-devel,
	Alasdair Kergon, Ondrej Mosnacek, Milan Broz, Herbert Xu,
	linux-crypto

On Wed, May 10, 2017 at 5:45 PM, Mike Snitzer <snitzer@redhat.com> wrote:
> On Wed, May 10 2017 at  9:37am -0400,
> Gilad Ben-Yossef <gilad@benyossef.com> wrote:
>
>> On Wed, May 10, 2017 at 11:49 AM, Neeraj Soni <neersoni@codeaurora.org> wrote:
>> > Hi Keith,
>> >
>> > Request based dm (dm-req-crypt) is being used for Disk Encryption solution
>> > in Android used by Google. Also as i mentioned reverting this fix  improves
>> > the RR/RW numbers so this proves the request based dm is coming into path
>> > and is being used.
>>
>> Sadly, that is an out of tree module.
>>
>> Does it still use Qcom specific APIs in its implementation (qcrypto_* funcs)?
>> It did the last time I've checked - and the driver that implements
>> those is not upstream either...
>>
>> It makes it difficult to help - which is a shame since I am interested
>> in enabling higher performance
>> of dm-crypt when using HW based crypto transformation myself.
>
> I have absolutely no interest in request-based dm-crypt.  It is a hack
> to work-around limitations in crypto IV generation.

I agree. This is why I've said I'm interested in a high performance dm-crypt,
not "request based dm-crypt". They are trying to solve the same problem but
with the wrong solution and doing so out of upstream.

As the parlance of our time seems to go... sad. :-)


Cheers,
Gilad


-- 
Gilad Ben-Yossef
Chief Coffee Drinker

"If you take a class in large-scale robotics, can you end up in a
situation where the homework eats your dog?"
 -- Jean-Baptiste Queru

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context]
  2017-05-10 14:55             ` Gilad Ben-Yossef
@ 2017-05-11  5:52               ` Neeraj Soni
  2017-05-11  5:54                 ` Neeraj Soni
  0 siblings, 1 reply; 4+ messages in thread
From: Neeraj Soni @ 2017-05-11  5:52 UTC (permalink / raw)
  To: Gilad Ben-Yossef, Mike Snitzer
  Cc: Christoph Hellwig, Keith Busch, dm-devel, Alasdair Kergon,
	Ondrej Mosnacek, Milan Broz, Herbert Xu, linux-crypto

Thanks for inputs folks. So shall i conclude that there is no remedy 
available that can be applied on 4.4 and reverting this patch is only 
way forward to solve the degradation?

Neeraj


On 5/10/2017 8:25 PM, Gilad Ben-Yossef wrote:
> On Wed, May 10, 2017 at 5:45 PM, Mike Snitzer <snitzer@redhat.com> wrote:
>> On Wed, May 10 2017 at  9:37am -0400,
>> Gilad Ben-Yossef <gilad@benyossef.com> wrote:
>>
>>> On Wed, May 10, 2017 at 11:49 AM, Neeraj Soni <neersoni@codeaurora.org> wrote:
>>>> Hi Keith,
>>>>
>>>> Request based dm (dm-req-crypt) is being used for Disk Encryption solution
>>>> in Android used by Google. Also as i mentioned reverting this fix  improves
>>>> the RR/RW numbers so this proves the request based dm is coming into path
>>>> and is being used.
>>> Sadly, that is an out of tree module.
>>>
>>> Does it still use Qcom specific APIs in its implementation (qcrypto_* funcs)?
>>> It did the last time I've checked - and the driver that implements
>>> those is not upstream either...
>>>
>>> It makes it difficult to help - which is a shame since I am interested
>>> in enabling higher performance
>>> of dm-crypt when using HW based crypto transformation myself.
>> I have absolutely no interest in request-based dm-crypt.  It is a hack
>> to work-around limitations in crypto IV generation.
> I agree. This is why I've said I'm interested in a high performance dm-crypt,
> not "request based dm-crypt". They are trying to solve the same problem but
> with the wrong solution and doing so out of upstream.
>
> As the parlance of our time seems to go... sad. :-)
>
>
> Cheers,
> Gilad
>
>

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context]
  2017-05-11  5:52               ` Neeraj Soni
@ 2017-05-11  5:54                 ` Neeraj Soni
  0 siblings, 0 replies; 4+ messages in thread
From: Neeraj Soni @ 2017-05-11  5:54 UTC (permalink / raw)
  To: Gilad Ben-Yossef, Mike Snitzer
  Cc: Christoph Hellwig, Keith Busch, dm-devel, Alasdair Kergon,
	Ondrej Mosnacek, Milan Broz, Herbert Xu, linux-crypto

Until we move to some latest stable kernel as Keith mentioned.

On 5/11/2017 11:22 AM, Neeraj Soni wrote:
> Thanks for inputs folks. So shall i conclude that there is no remedy 
> available that can be applied on 4.4 and reverting this patch is only 
> way forward to solve the degradation?
>
> Neeraj
>
>
> On 5/10/2017 8:25 PM, Gilad Ben-Yossef wrote:
>> On Wed, May 10, 2017 at 5:45 PM, Mike Snitzer <snitzer@redhat.com> 
>> wrote:
>>> On Wed, May 10 2017 at  9:37am -0400,
>>> Gilad Ben-Yossef <gilad@benyossef.com> wrote:
>>>
>>>> On Wed, May 10, 2017 at 11:49 AM, Neeraj Soni 
>>>> <neersoni@codeaurora.org> wrote:
>>>>> Hi Keith,
>>>>>
>>>>> Request based dm (dm-req-crypt) is being used for Disk Encryption 
>>>>> solution
>>>>> in Android used by Google. Also as i mentioned reverting this fix  
>>>>> improves
>>>>> the RR/RW numbers so this proves the request based dm is coming 
>>>>> into path
>>>>> and is being used.
>>>> Sadly, that is an out of tree module.
>>>>
>>>> Does it still use Qcom specific APIs in its implementation 
>>>> (qcrypto_* funcs)?
>>>> It did the last time I've checked - and the driver that implements
>>>> those is not upstream either...
>>>>
>>>> It makes it difficult to help - which is a shame since I am interested
>>>> in enabling higher performance
>>>> of dm-crypt when using HW based crypto transformation myself.
>>> I have absolutely no interest in request-based dm-crypt.  It is a hack
>>> to work-around limitations in crypto IV generation.
>> I agree. This is why I've said I'm interested in a high performance 
>> dm-crypt,
>> not "request based dm-crypt". They are trying to solve the same 
>> problem but
>> with the wrong solution and doing so out of upstream.
>>
>> As the parlance of our time seems to go... sad. :-)
>>
>>
>> Cheers,
>> Gilad
>>
>>
>

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2017-05-11  5:54 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <a66b6e17-a8c4-3465-fc2e-c3114abe0ca7@codeaurora.org>
     [not found] ` <dee12838-7b43-2fdd-0644-41c10ecf9148@codeaurora.org>
     [not found]   ` <20170509155555.GB2572@localhost.localdomain>
     [not found]     ` <20170510071733.GA24980@infradead.org>
     [not found]       ` <39356321-b39b-98c7-f52b-ffd19d6dfc69@codeaurora.org>
     [not found]         ` <CAOtvUMcjULAOZYQ3K_XDvxcFoFJJjX-wxF6e6Y1+-r67tS_Y7g@mail.gmail.com>
2017-05-10 14:45           ` need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context] Mike Snitzer
2017-05-10 14:55             ` Gilad Ben-Yossef
2017-05-11  5:52               ` Neeraj Soni
2017-05-11  5:54                 ` Neeraj Soni

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).