* need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context]
[not found] ` <CAOtvUMcjULAOZYQ3K_XDvxcFoFJJjX-wxF6e6Y1+-r67tS_Y7g@mail.gmail.com>
@ 2017-05-10 14:45 ` Mike Snitzer
2017-05-10 14:55 ` Gilad Ben-Yossef
0 siblings, 1 reply; 4+ messages in thread
From: Mike Snitzer @ 2017-05-10 14:45 UTC (permalink / raw)
To: Gilad Ben-Yossef
Cc: Neeraj Soni, Christoph Hellwig, Keith Busch, dm-devel,
Alasdair Kergon, Ondrej Mosnacek, Milan Broz, Herbert Xu,
linux-crypto
On Wed, May 10 2017 at 9:37am -0400,
Gilad Ben-Yossef <gilad@benyossef.com> wrote:
> On Wed, May 10, 2017 at 11:49 AM, Neeraj Soni <neersoni@codeaurora.org> wrote:
> > Hi Keith,
> >
> > Request based dm (dm-req-crypt) is being used for Disk Encryption solution
> > in Android used by Google. Also as i mentioned reverting this fix improves
> > the RR/RW numbers so this proves the request based dm is coming into path
> > and is being used.
>
> Sadly, that is an out of tree module.
>
> Does it still use Qcom specific APIs in its implementation (qcrypto_* funcs)?
> It did the last time I've checked - and the driver that implements
> those is not upstream either...
>
> It makes it difficult to help - which is a shame since I am interested
> in enabling higher performance
> of dm-crypt when using HW based crypto transformation myself.
I have absolutely no interest in request-based dm-crypt. It is a hack
to work-around limitations in crypto IV generation.
If "google" is foolish enough to deploy out-of-tree request-based
dm-crypt in their android kernel then they are easily capable of
reverting the commit in question to prop up their short-cited decision.
The correct way forward is to follow through with the crypto work
discussed here (pick a solution to implement and make it happen):
https://www.redhat.com/archives/dm-devel/2017-March/msg00044.html
and here:
https://www.redhat.com/archives/dm-devel/2017-March/msg00053.html
and here:
https://www.redhat.com/archives/dm-devel/2017-April/msg00132.html
Mike
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context]
2017-05-10 14:45 ` need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context] Mike Snitzer
@ 2017-05-10 14:55 ` Gilad Ben-Yossef
2017-05-11 5:52 ` Neeraj Soni
0 siblings, 1 reply; 4+ messages in thread
From: Gilad Ben-Yossef @ 2017-05-10 14:55 UTC (permalink / raw)
To: Mike Snitzer
Cc: Neeraj Soni, Christoph Hellwig, Keith Busch, dm-devel,
Alasdair Kergon, Ondrej Mosnacek, Milan Broz, Herbert Xu,
linux-crypto
On Wed, May 10, 2017 at 5:45 PM, Mike Snitzer <snitzer@redhat.com> wrote:
> On Wed, May 10 2017 at 9:37am -0400,
> Gilad Ben-Yossef <gilad@benyossef.com> wrote:
>
>> On Wed, May 10, 2017 at 11:49 AM, Neeraj Soni <neersoni@codeaurora.org> wrote:
>> > Hi Keith,
>> >
>> > Request based dm (dm-req-crypt) is being used for Disk Encryption solution
>> > in Android used by Google. Also as i mentioned reverting this fix improves
>> > the RR/RW numbers so this proves the request based dm is coming into path
>> > and is being used.
>>
>> Sadly, that is an out of tree module.
>>
>> Does it still use Qcom specific APIs in its implementation (qcrypto_* funcs)?
>> It did the last time I've checked - and the driver that implements
>> those is not upstream either...
>>
>> It makes it difficult to help - which is a shame since I am interested
>> in enabling higher performance
>> of dm-crypt when using HW based crypto transformation myself.
>
> I have absolutely no interest in request-based dm-crypt. It is a hack
> to work-around limitations in crypto IV generation.
I agree. This is why I've said I'm interested in a high performance dm-crypt,
not "request based dm-crypt". They are trying to solve the same problem but
with the wrong solution and doing so out of upstream.
As the parlance of our time seems to go... sad. :-)
Cheers,
Gilad
--
Gilad Ben-Yossef
Chief Coffee Drinker
"If you take a class in large-scale robotics, can you end up in a
situation where the homework eats your dog?"
-- Jean-Baptiste Queru
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context]
2017-05-10 14:55 ` Gilad Ben-Yossef
@ 2017-05-11 5:52 ` Neeraj Soni
2017-05-11 5:54 ` Neeraj Soni
0 siblings, 1 reply; 4+ messages in thread
From: Neeraj Soni @ 2017-05-11 5:52 UTC (permalink / raw)
To: Gilad Ben-Yossef, Mike Snitzer
Cc: Christoph Hellwig, Keith Busch, dm-devel, Alasdair Kergon,
Ondrej Mosnacek, Milan Broz, Herbert Xu, linux-crypto
Thanks for inputs folks. So shall i conclude that there is no remedy
available that can be applied on 4.4 and reverting this patch is only
way forward to solve the degradation?
Neeraj
On 5/10/2017 8:25 PM, Gilad Ben-Yossef wrote:
> On Wed, May 10, 2017 at 5:45 PM, Mike Snitzer <snitzer@redhat.com> wrote:
>> On Wed, May 10 2017 at 9:37am -0400,
>> Gilad Ben-Yossef <gilad@benyossef.com> wrote:
>>
>>> On Wed, May 10, 2017 at 11:49 AM, Neeraj Soni <neersoni@codeaurora.org> wrote:
>>>> Hi Keith,
>>>>
>>>> Request based dm (dm-req-crypt) is being used for Disk Encryption solution
>>>> in Android used by Google. Also as i mentioned reverting this fix improves
>>>> the RR/RW numbers so this proves the request based dm is coming into path
>>>> and is being used.
>>> Sadly, that is an out of tree module.
>>>
>>> Does it still use Qcom specific APIs in its implementation (qcrypto_* funcs)?
>>> It did the last time I've checked - and the driver that implements
>>> those is not upstream either...
>>>
>>> It makes it difficult to help - which is a shame since I am interested
>>> in enabling higher performance
>>> of dm-crypt when using HW based crypto transformation myself.
>> I have absolutely no interest in request-based dm-crypt. It is a hack
>> to work-around limitations in crypto IV generation.
> I agree. This is why I've said I'm interested in a high performance dm-crypt,
> not "request based dm-crypt". They are trying to solve the same problem but
> with the wrong solution and doing so out of upstream.
>
> As the parlance of our time seems to go... sad. :-)
>
>
> Cheers,
> Gilad
>
>
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context]
2017-05-11 5:52 ` Neeraj Soni
@ 2017-05-11 5:54 ` Neeraj Soni
0 siblings, 0 replies; 4+ messages in thread
From: Neeraj Soni @ 2017-05-11 5:54 UTC (permalink / raw)
To: Gilad Ben-Yossef, Mike Snitzer
Cc: Christoph Hellwig, Keith Busch, dm-devel, Alasdair Kergon,
Ondrej Mosnacek, Milan Broz, Herbert Xu, linux-crypto
Until we move to some latest stable kernel as Keith mentioned.
On 5/11/2017 11:22 AM, Neeraj Soni wrote:
> Thanks for inputs folks. So shall i conclude that there is no remedy
> available that can be applied on 4.4 and reverting this patch is only
> way forward to solve the degradation?
>
> Neeraj
>
>
> On 5/10/2017 8:25 PM, Gilad Ben-Yossef wrote:
>> On Wed, May 10, 2017 at 5:45 PM, Mike Snitzer <snitzer@redhat.com>
>> wrote:
>>> On Wed, May 10 2017 at 9:37am -0400,
>>> Gilad Ben-Yossef <gilad@benyossef.com> wrote:
>>>
>>>> On Wed, May 10, 2017 at 11:49 AM, Neeraj Soni
>>>> <neersoni@codeaurora.org> wrote:
>>>>> Hi Keith,
>>>>>
>>>>> Request based dm (dm-req-crypt) is being used for Disk Encryption
>>>>> solution
>>>>> in Android used by Google. Also as i mentioned reverting this fix
>>>>> improves
>>>>> the RR/RW numbers so this proves the request based dm is coming
>>>>> into path
>>>>> and is being used.
>>>> Sadly, that is an out of tree module.
>>>>
>>>> Does it still use Qcom specific APIs in its implementation
>>>> (qcrypto_* funcs)?
>>>> It did the last time I've checked - and the driver that implements
>>>> those is not upstream either...
>>>>
>>>> It makes it difficult to help - which is a shame since I am interested
>>>> in enabling higher performance
>>>> of dm-crypt when using HW based crypto transformation myself.
>>> I have absolutely no interest in request-based dm-crypt. It is a hack
>>> to work-around limitations in crypto IV generation.
>> I agree. This is why I've said I'm interested in a high performance
>> dm-crypt,
>> not "request based dm-crypt". They are trying to solve the same
>> problem but
>> with the wrong solution and doing so out of upstream.
>>
>> As the parlance of our time seems to go... sad. :-)
>>
>>
>> Cheers,
>> Gilad
>>
>>
>
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2017-05-11 5:54 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <a66b6e17-a8c4-3465-fc2e-c3114abe0ca7@codeaurora.org>
[not found] ` <dee12838-7b43-2fdd-0644-41c10ecf9148@codeaurora.org>
[not found] ` <20170509155555.GB2572@localhost.localdomain>
[not found] ` <20170510071733.GA24980@infradead.org>
[not found] ` <39356321-b39b-98c7-f52b-ffd19d6dfc69@codeaurora.org>
[not found] ` <CAOtvUMcjULAOZYQ3K_XDvxcFoFJJjX-wxF6e6Y1+-r67tS_Y7g@mail.gmail.com>
2017-05-10 14:45 ` need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context] Mike Snitzer
2017-05-10 14:55 ` Gilad Ben-Yossef
2017-05-11 5:52 ` Neeraj Soni
2017-05-11 5:54 ` Neeraj Soni
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).