public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Vlad Harchev <hvv@hippo.ru>
To: Neil Brown <neilb@cse.unsw.edu.au>
Cc: linux-kernel@vger.kernel.org
Subject: Re: 2.4 and cryptofs on raid1 - what will be cached and how many times
Date: Tue, 4 Mar 2003 13:30:20 +0400	[thread overview]
Message-ID: <20030304093020.GA4024@h> (raw)
In-Reply-To: <15971.52790.676134.722437@notabene.cse.unsw.edu.au>

On Tue, Mar 04, 2003 at 08:50:46AM +1100, Neil Brown wrote:
> On Monday March 3, hvv@hippo.ru wrote:
> > On Sun, Mar 02, 2003 at 02:56:34PM +0400, Vlad Harchev wrote:
> > > Hello, 
> > > 
> > > Could you please answer the following question:
> > > 
> > > Suppose we have a crypto filesystem on a raid1 array  of 2 devices. What will
> > > the kernel cache of fileystem data contain - encrypted data or not? Will is 
> > > be 2 copies of the same data in the cache or not?
> > 
> > Sorry for confusion - of course I meant linux software raid here..
> 
> With raid1 has no effect on caching.  Exactly the same data is cached
> with raid1 as with as plain SCSI or IDE drive.

 The question I asked is - will under the active usage there be exactly one
copy of a file's data, or there will be N (where N is number of disks in raid1
array) copies in the cache? I.e. how optimal caching is performed?
 
> Raid5 is different.  It has an extra cache of some of the data that
> has been written-to or read-from the devices.

 OK, thank you for pointing this.
 
> 
> >  
> > > Is there any way to force kernel to cache the same file data only once, and
> > > keep it unencrypted (in cache)?
> > > 
> 
> I suspect that depends of the details of the implementation of you
> "crypto filesystem".

 Sorry for confusion - I meant loopback-based crypto filesystem - e.g. loop-aes
based (loop-aes.sourceforge.net) or CryptoAPI-based (www.kerneli.org) - both
are loopback-based filesystem (one has to call losetup(8) to point out chipher,
a password..) I'm getting an impression that the kernel cache will contain
encrypted data in case loopback-based crypto filesystems are used just 
observing performance..

Thank you for the anwser!
-- 
 Best regards,
  -Vlad

  reply	other threads:[~2003-03-04  7:54 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2003-03-02 10:56 2.4 and cryptofs on raid1 - what will be cached and how many times Vlad Harchev
2003-03-03  9:38 ` Vlad Harchev
2003-03-03 21:50   ` Neil Brown
2003-03-04  9:30     ` Vlad Harchev [this message]
2003-03-04  9:20       ` Jörn Engel
2003-03-04 11:31         ` Vlad Harchev
2003-03-04 11:07           ` Bryan Andersen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20030304093020.GA4024@h \
    --to=hvv@hippo.ru \
    --cc=linux-kernel@vger.kernel.org \
    --cc=neilb@cse.unsw.edu.au \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox