* need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context] [not found] ` <CAOtvUMcjULAOZYQ3K_XDvxcFoFJJjX-wxF6e6Y1+-r67tS_Y7g@mail.gmail.com> @ 2017-05-10 14:45 ` Mike Snitzer 2017-05-10 14:55 ` Gilad Ben-Yossef 0 siblings, 1 reply; 4+ messages in thread From: Mike Snitzer @ 2017-05-10 14:45 UTC (permalink / raw) To: Gilad Ben-Yossef Cc: Neeraj Soni, Christoph Hellwig, Keith Busch, dm-devel, Alasdair Kergon, Ondrej Mosnacek, Milan Broz, Herbert Xu, linux-crypto On Wed, May 10 2017 at 9:37am -0400, Gilad Ben-Yossef <gilad@benyossef.com> wrote: > On Wed, May 10, 2017 at 11:49 AM, Neeraj Soni <neersoni@codeaurora.org> wrote: > > Hi Keith, > > > > Request based dm (dm-req-crypt) is being used for Disk Encryption solution > > in Android used by Google. Also as i mentioned reverting this fix improves > > the RR/RW numbers so this proves the request based dm is coming into path > > and is being used. > > Sadly, that is an out of tree module. > > Does it still use Qcom specific APIs in its implementation (qcrypto_* funcs)? > It did the last time I've checked - and the driver that implements > those is not upstream either... > > It makes it difficult to help - which is a shame since I am interested > in enabling higher performance > of dm-crypt when using HW based crypto transformation myself. I have absolutely no interest in request-based dm-crypt. It is a hack to work-around limitations in crypto IV generation. If "google" is foolish enough to deploy out-of-tree request-based dm-crypt in their android kernel then they are easily capable of reverting the commit in question to prop up their short-cited decision. The correct way forward is to follow through with the crypto work discussed here (pick a solution to implement and make it happen): https://www.redhat.com/archives/dm-devel/2017-March/msg00044.html and here: https://www.redhat.com/archives/dm-devel/2017-March/msg00053.html and here: https://www.redhat.com/archives/dm-devel/2017-April/msg00132.html Mike ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context] 2017-05-10 14:45 ` need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context] Mike Snitzer @ 2017-05-10 14:55 ` Gilad Ben-Yossef 2017-05-11 5:52 ` Neeraj Soni 0 siblings, 1 reply; 4+ messages in thread From: Gilad Ben-Yossef @ 2017-05-10 14:55 UTC (permalink / raw) To: Mike Snitzer Cc: Neeraj Soni, Christoph Hellwig, Keith Busch, dm-devel, Alasdair Kergon, Ondrej Mosnacek, Milan Broz, Herbert Xu, linux-crypto On Wed, May 10, 2017 at 5:45 PM, Mike Snitzer <snitzer@redhat.com> wrote: > On Wed, May 10 2017 at 9:37am -0400, > Gilad Ben-Yossef <gilad@benyossef.com> wrote: > >> On Wed, May 10, 2017 at 11:49 AM, Neeraj Soni <neersoni@codeaurora.org> wrote: >> > Hi Keith, >> > >> > Request based dm (dm-req-crypt) is being used for Disk Encryption solution >> > in Android used by Google. Also as i mentioned reverting this fix improves >> > the RR/RW numbers so this proves the request based dm is coming into path >> > and is being used. >> >> Sadly, that is an out of tree module. >> >> Does it still use Qcom specific APIs in its implementation (qcrypto_* funcs)? >> It did the last time I've checked - and the driver that implements >> those is not upstream either... >> >> It makes it difficult to help - which is a shame since I am interested >> in enabling higher performance >> of dm-crypt when using HW based crypto transformation myself. > > I have absolutely no interest in request-based dm-crypt. It is a hack > to work-around limitations in crypto IV generation. I agree. This is why I've said I'm interested in a high performance dm-crypt, not "request based dm-crypt". They are trying to solve the same problem but with the wrong solution and doing so out of upstream. As the parlance of our time seems to go... sad. :-) Cheers, Gilad -- Gilad Ben-Yossef Chief Coffee Drinker "If you take a class in large-scale robotics, can you end up in a situation where the homework eats your dog?" -- Jean-Baptiste Queru ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context] 2017-05-10 14:55 ` Gilad Ben-Yossef @ 2017-05-11 5:52 ` Neeraj Soni 2017-05-11 5:54 ` Neeraj Soni 0 siblings, 1 reply; 4+ messages in thread From: Neeraj Soni @ 2017-05-11 5:52 UTC (permalink / raw) To: Gilad Ben-Yossef, Mike Snitzer Cc: Christoph Hellwig, Keith Busch, dm-devel, Alasdair Kergon, Ondrej Mosnacek, Milan Broz, Herbert Xu, linux-crypto Thanks for inputs folks. So shall i conclude that there is no remedy available that can be applied on 4.4 and reverting this patch is only way forward to solve the degradation? Neeraj On 5/10/2017 8:25 PM, Gilad Ben-Yossef wrote: > On Wed, May 10, 2017 at 5:45 PM, Mike Snitzer <snitzer@redhat.com> wrote: >> On Wed, May 10 2017 at 9:37am -0400, >> Gilad Ben-Yossef <gilad@benyossef.com> wrote: >> >>> On Wed, May 10, 2017 at 11:49 AM, Neeraj Soni <neersoni@codeaurora.org> wrote: >>>> Hi Keith, >>>> >>>> Request based dm (dm-req-crypt) is being used for Disk Encryption solution >>>> in Android used by Google. Also as i mentioned reverting this fix improves >>>> the RR/RW numbers so this proves the request based dm is coming into path >>>> and is being used. >>> Sadly, that is an out of tree module. >>> >>> Does it still use Qcom specific APIs in its implementation (qcrypto_* funcs)? >>> It did the last time I've checked - and the driver that implements >>> those is not upstream either... >>> >>> It makes it difficult to help - which is a shame since I am interested >>> in enabling higher performance >>> of dm-crypt when using HW based crypto transformation myself. >> I have absolutely no interest in request-based dm-crypt. It is a hack >> to work-around limitations in crypto IV generation. > I agree. This is why I've said I'm interested in a high performance dm-crypt, > not "request based dm-crypt". They are trying to solve the same problem but > with the wrong solution and doing so out of upstream. > > As the parlance of our time seems to go... sad. :-) > > > Cheers, > Gilad > > ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context] 2017-05-11 5:52 ` Neeraj Soni @ 2017-05-11 5:54 ` Neeraj Soni 0 siblings, 0 replies; 4+ messages in thread From: Neeraj Soni @ 2017-05-11 5:54 UTC (permalink / raw) To: Gilad Ben-Yossef, Mike Snitzer Cc: Christoph Hellwig, Keith Busch, dm-devel, Alasdair Kergon, Ondrej Mosnacek, Milan Broz, Herbert Xu, linux-crypto Until we move to some latest stable kernel as Keith mentioned. On 5/11/2017 11:22 AM, Neeraj Soni wrote: > Thanks for inputs folks. So shall i conclude that there is no remedy > available that can be applied on 4.4 and reverting this patch is only > way forward to solve the degradation? > > Neeraj > > > On 5/10/2017 8:25 PM, Gilad Ben-Yossef wrote: >> On Wed, May 10, 2017 at 5:45 PM, Mike Snitzer <snitzer@redhat.com> >> wrote: >>> On Wed, May 10 2017 at 9:37am -0400, >>> Gilad Ben-Yossef <gilad@benyossef.com> wrote: >>> >>>> On Wed, May 10, 2017 at 11:49 AM, Neeraj Soni >>>> <neersoni@codeaurora.org> wrote: >>>>> Hi Keith, >>>>> >>>>> Request based dm (dm-req-crypt) is being used for Disk Encryption >>>>> solution >>>>> in Android used by Google. Also as i mentioned reverting this fix >>>>> improves >>>>> the RR/RW numbers so this proves the request based dm is coming >>>>> into path >>>>> and is being used. >>>> Sadly, that is an out of tree module. >>>> >>>> Does it still use Qcom specific APIs in its implementation >>>> (qcrypto_* funcs)? >>>> It did the last time I've checked - and the driver that implements >>>> those is not upstream either... >>>> >>>> It makes it difficult to help - which is a shame since I am interested >>>> in enabling higher performance >>>> of dm-crypt when using HW based crypto transformation myself. >>> I have absolutely no interest in request-based dm-crypt. It is a hack >>> to work-around limitations in crypto IV generation. >> I agree. This is why I've said I'm interested in a high performance >> dm-crypt, >> not "request based dm-crypt". They are trying to solve the same >> problem but >> with the wrong solution and doing so out of upstream. >> >> As the parlance of our time seems to go... sad. :-) >> >> >> Cheers, >> Gilad >> >> > ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2017-05-11 5:54 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <a66b6e17-a8c4-3465-fc2e-c3114abe0ca7@codeaurora.org>
[not found] ` <dee12838-7b43-2fdd-0644-41c10ecf9148@codeaurora.org>
[not found] ` <20170509155555.GB2572@localhost.localdomain>
[not found] ` <20170510071733.GA24980@infradead.org>
[not found] ` <39356321-b39b-98c7-f52b-ffd19d6dfc69@codeaurora.org>
[not found] ` <CAOtvUMcjULAOZYQ3K_XDvxcFoFJJjX-wxF6e6Y1+-r67tS_Y7g@mail.gmail.com>
2017-05-10 14:45 ` need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context] Mike Snitzer
2017-05-10 14:55 ` Gilad Ben-Yossef
2017-05-11 5:52 ` Neeraj Soni
2017-05-11 5:54 ` Neeraj Soni
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).