* [dm-crypt] AES-XTS performance
@ 2010-11-15 12:36 Igor Novgorodov
2010-11-15 14:25 ` Milan Broz
2010-11-15 14:38 ` Arno Wagner
0 siblings, 2 replies; 10+ messages in thread
From: Igor Novgorodov @ 2010-11-15 12:36 UTC (permalink / raw)
To: dm-crypt
Hello!
I've got a question regarding encryption performance with
XTS mode in dm-crypt, which is too low for what i
get.
Test system:
- Supermicro X8DTH-6F
- 1 x 4-Core Xeon E5620 with HyperThreading & AES-NI
- 12Gb RAM DDR3 Reg ECC
Preparation:
# mount -t tmpfs tmpfs -o size=4G /mnt/tmpfs
# dd if=/dev/zero of=/mnt/tmpfs/image
# losetup /dev/loop0 /mnt/tmpfs/image
AES-XTS-ESSIV:SHA256 + 512bit key
READ: 220 MB/s
WRITE: 79.6 MB/s
AES-XTS-ESSIV:SHA256 + 256bit key
READ: 259 MB/s
WRITE: 86.6 MB/s
And with CBC mode we get reasonable read performance (for AES-NI), but
writing is as almost slow as before:
AES-CBC-ESSIV:SHA256
READ: 495 MB/s
WRITE: 107 MB/s
AES-XTS-PLAIN64
READ: 271 MB/s
WRTITE: 90.2 MB/s
What is the problem here?
With aes-cbc-plain64 i get ~560Mb read, and another slow write ~110Mb.
Is that a limitation of a benchmark with loopback devices & tmpfs?
Write speed is very slow, as i want to saturate a very fast RAID
array (24 x 1Tb RAID6), which can deliver up to 800Mb/sec read:
# echo 3 > /proc/sys/vm/drop_caches
# dd if=/dev/sda of=/dev/null bs=1M count=20480
20480+0 records in
20480+0 records out
21474836480 bytes (21 GB) copied, 27.3376 s, 786 MB/s
Any suggestions? Why write speed is so low?
And why with XTS i get 50% speed drop, is that normal?
Thank you!
P.S.
In Windows with Trucrypt internal benchmark i get 1.6Gb/s
AES encryption speed with AES-NI even on low-end Core i5-620.
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dm-crypt] AES-XTS performance
2010-11-15 12:36 [dm-crypt] AES-XTS performance Igor Novgorodov
@ 2010-11-15 14:25 ` Milan Broz
2010-11-16 6:53 ` Igor Novgorodov
` (2 more replies)
2010-11-15 14:38 ` Arno Wagner
1 sibling, 3 replies; 10+ messages in thread
From: Milan Broz @ 2010-11-15 14:25 UTC (permalink / raw)
To: Igor Novgorodov; +Cc: dm-crypt
On 11/15/2010 01:36 PM, Igor Novgorodov wrote:
> Hello!
> I've got a question regarding encryption performance with
> XTS mode in dm-crypt, which is too low for what i
> get.
>
> Test system:
> - Supermicro X8DTH-6F
> - 1 x 4-Core Xeon E5620 with HyperThreading & AES-NI
> - 12Gb RAM DDR3 Reg ECC
>
> Preparation:
> # mount -t tmpfs tmpfs -o size=4G /mnt/tmpfs
> # dd if=/dev/zero of=/mnt/tmpfs/image
> # losetup /dev/loop0 /mnt/tmpfs/image
Loop is not ideal device to test but it is not the problem.
The main problem is that dm-crypt uses only one core per device.
If you want to do some tests, try this patch
http://lkml.org/lkml/2010/11/12/344
(but there is still some issues and it will not help much
if only one process generates IOs.)
> And with CBC mode we get reasonable read performance (for AES-NI), but
> writing is as almost slow as before:
I think the write slowdown is partially loop problem here.
> What is the problem here?
> With aes-cbc-plain64 i get ~560Mb read, and another slow write ~110Mb.
Nice to benchmarking, but do not use plain/plain64 in CBC mode for data.
(It is vulnerable.)
> Any suggestions? Why write speed is so low?
Can you please try patch above? Will it help here?
(There are more possible fixes but stability is the No.1 here,
and we have still some unresolved problems with that.)
> And why with XTS i get 50% speed drop, is that normal?
In principle, XTS run 2x AES operation in comparison to CBC mode,
so I would say it is expected.
> In Windows with Trucrypt internal benchmark i get 1.6Gb/s
> AES encryption speed with AES-NI even on low-end Core i5-620.
You cannot compare internal benchmark to dm-crypt over loop.
dm-crypt uses 512b sectors and mainly block layer limits it here.
If you use device-mapper zero target as backing device you can get
better numbers but still it is comparing something different.
Milan
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dm-crypt] AES-XTS performance
2010-11-15 12:36 [dm-crypt] AES-XTS performance Igor Novgorodov
2010-11-15 14:25 ` Milan Broz
@ 2010-11-15 14:38 ` Arno Wagner
1 sibling, 0 replies; 10+ messages in thread
From: Arno Wagner @ 2010-11-15 14:38 UTC (permalink / raw)
To: dm-crypt
The asymmetry strongly suggests that the cipher is not the
bottleneck in writes.
For reads, take into account that hyper-threaded cores can be
vastly slower than real ones. I have seen this admittedly only
on an Atom CPU so far, but there I had to disable hyperthreading
to get reasonable performance.
Arno
On Mon, Nov 15, 2010 at 03:36:04PM +0300, Igor Novgorodov wrote:
> Hello!
> I've got a question regarding encryption performance with
> XTS mode in dm-crypt, which is too low for what i
> get.
>
> Test system:
> - Supermicro X8DTH-6F
> - 1 x 4-Core Xeon E5620 with HyperThreading & AES-NI
> - 12Gb RAM DDR3 Reg ECC
>
> Preparation:
> # mount -t tmpfs tmpfs -o size=4G /mnt/tmpfs
> # dd if=/dev/zero of=/mnt/tmpfs/image
> # losetup /dev/loop0 /mnt/tmpfs/image
>
> AES-XTS-ESSIV:SHA256 + 512bit key
> READ: 220 MB/s
> WRITE: 79.6 MB/s
>
> AES-XTS-ESSIV:SHA256 + 256bit key
> READ: 259 MB/s
> WRITE: 86.6 MB/s
>
> And with CBC mode we get reasonable read performance (for AES-NI), but
> writing is as almost slow as before:
>
> AES-CBC-ESSIV:SHA256
> READ: 495 MB/s
> WRITE: 107 MB/s
>
> AES-XTS-PLAIN64
> READ: 271 MB/s
> WRTITE: 90.2 MB/s
>
> What is the problem here?
> With aes-cbc-plain64 i get ~560Mb read, and another slow write ~110Mb.
>
> Is that a limitation of a benchmark with loopback devices & tmpfs?
> Write speed is very slow, as i want to saturate a very fast RAID
> array (24 x 1Tb RAID6), which can deliver up to 800Mb/sec read:
> # echo 3 > /proc/sys/vm/drop_caches
> # dd if=/dev/sda of=/dev/null bs=1M count=20480
> 20480+0 records in
> 20480+0 records out
> 21474836480 bytes (21 GB) copied, 27.3376 s, 786 MB/s
>
> Any suggestions? Why write speed is so low?
> And why with XTS i get 50% speed drop, is that normal?
> Thank you!
>
> P.S.
> In Windows with Trucrypt internal benchmark i get 1.6Gb/s
> AES encryption speed with AES-NI even on low-end Core i5-620.
>
>
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@saout.de
> http://www.saout.de/mailman/listinfo/dm-crypt
>
--
Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@wagner.name
GnuPG: ID: 1E25338F FP: 0C30 5782 9D93 F785 E79C 0296 797F 6B50 1E25 338F
----
Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans
If it's in the news, don't worry about it. The very definition of
"news" is "something that hardly ever happens." -- Bruce Schneier
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dm-crypt] AES-XTS performance
2010-11-15 14:25 ` Milan Broz
@ 2010-11-16 6:53 ` Igor Novgorodov
2010-11-16 7:31 ` Igor Novgorodov
2010-11-17 23:39 ` Jakob-Tobias Winter
2 siblings, 0 replies; 10+ messages in thread
From: Igor Novgorodov @ 2010-11-16 6:53 UTC (permalink / raw)
To: Milan Broz; +Cc: dm-crypt
> On 11/15/2010 01:36 PM, Igor Novgorodov wrote:
>> Hello!
>> I've got a question regarding encryption performance with
>> XTS mode in dm-crypt, which is too low for what i
>> get.
>>
>> Test system:
>> - Supermicro X8DTH-6F
>> - 1 x 4-Core Xeon E5620 with HyperThreading & AES-NI
>> - 12Gb RAM DDR3 Reg ECC
>>
>> Preparation:
>> # mount -t tmpfs tmpfs -o size=4G /mnt/tmpfs
>> # dd if=/dev/zero of=/mnt/tmpfs/image
>> # losetup /dev/loop0 /mnt/tmpfs/image
> Loop is not ideal device to test but it is not the problem.
> The main problem is that dm-crypt uses only one core per device.
> If you want to do some tests, try this patch
> http://lkml.org/lkml/2010/11/12/344
> (but there is still some issues and it will not help much
> if only one process generates IOs.)
Yes, i know about synchronous nature of dm-crypt,
but i thought that using AES-NI somehow alleviates
this problem, as it as i remember uses asynchronous crypto api (AEAD?),
but i may be wrong, just read somewhere.
Thanks, i'll try your patch and will report of any problems found.
>> And with CBC mode we get reasonable read performance (for AES-NI), but
>> writing is as almost slow as before:
> I think the write slowdown is partially loop problem here.
Yes, it looks so, as AES is quite symmetrical on
encryption/decryption. Tests on real filesystem shows same enc/dec
speed.
>> What is the problem here?
>> With aes-cbc-plain64 i get ~560Mb read, and another slow write ~110Mb.
> Nice to benchmarking, but do not use plain/plain64 in CBC mode for data.
> (It is vulnerable.)
Of course, i've read about watermarking attacks.
If XTS mode will remain too slow, i'll switch to CBC-ESSIV.
>> Any suggestions? Why write speed is so low?
> Can you please try patch above? Will it help here?
> (There are more possible fixes but stability is the No.1 here,
> and we have still some unresolved problems with that.)
>> And why with XTS i get 50% speed drop, is that normal?
> In principle, XTS run 2x AES operation in comparison to CBC mode,
> so I would say it is expected.
Hmm. It looks correct.
>> In Windows with Trucrypt internal benchmark i get 1.6Gb/s
>> AES encryption speed with AES-NI even on low-end Core i5-620.
> You cannot compare internal benchmark to dm-crypt over loop.
> dm-crypt uses 512b sectors and mainly block layer limits it here.
Accoding to http://www.truecrypt.org/docs/?s=modes-of-operation
truecrypt uses 512b unit size too, but, of course, raw in-memory
encryption is not compared to multiple-layer model of linux, but i
thought that difference of hunderds of percents is too big.
But it may be due to a multithreaded nature of TC.
> If you use device-mapper zero target as backing device you can get
> better numbers but still it is comparing something different.
I'll try that, thanks, i didn't even thought of this target before :)
> Milan
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dm-crypt] AES-XTS performance
2010-11-15 14:25 ` Milan Broz
2010-11-16 6:53 ` Igor Novgorodov
@ 2010-11-16 7:31 ` Igor Novgorodov
2010-11-16 9:25 ` Milan Broz
2010-11-17 23:39 ` Jakob-Tobias Winter
2 siblings, 1 reply; 10+ messages in thread
From: Igor Novgorodov @ 2010-11-16 7:31 UTC (permalink / raw)
To: Milan Broz; +Cc: dm-crypt
> Loop is not ideal device to test but it is not the problem.
> The main problem is that dm-crypt uses only one core per device.
> If you want to do some tests, try this patch
> http://lkml.org/lkml/2010/11/12/344
> (but there is still some issues and it will not help much
> if only one process generates IOs.)
I've tried to apply this patch against 2.6.36 and 2.6.37-rc2
but without success:
# patch -p1 -i ./dm-crypt-patch.diff
patching file drivers/md/dm-crypt.c
Hunk #2 FAILED at 78.
Hunk #3 succeeded at 91 with fuzz 2.
Hunk #4 FAILED at 133.
Hunk #5 FAILED at 152.
Hunk #7 FAILED at 227.
Hunk #8 FAILED at 239.
Hunk #9 FAILED at 259.
Hunk #10 FAILED at 336.
Hunk #11 FAILED at 358.
Hunk #12 FAILED at 381.
Hunk #13 FAILED at 501.
Hunk #14 FAILED at 546.
Hunk #15 FAILED at 562.
Hunk #16 succeeded at 574 with fuzz 2.
Hunk #17 FAILED at 583.
Hunk #19 succeeded at 1065 with fuzz 1.
Hunk #20 FAILED at 1096.
Hunk #21 FAILED at 1136.
Hunk #22 FAILED at 1155.
Hunk #23 FAILED at 1174.
Hunk #24 FAILED at 1209.
Hunk #25 FAILED at 1240.
Hunk #26 FAILED at 1259.
Hunk #27 FAILED at 1323.
Hunk #28 FAILED at 1354.
Hunk #29 FAILED at 1365.
Hunk #30 FAILED at 1378.
Hunk #31 FAILED at 1405.
25 out of 31 hunks FAILED -- saving rejects to file drivers/md/dm-crypt.c.rej
What version of kernel should i patch? GIT?
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dm-crypt] AES-XTS performance
2010-11-16 7:31 ` Igor Novgorodov
@ 2010-11-16 9:25 ` Milan Broz
2010-11-16 11:32 ` Igor Novgorodov
0 siblings, 1 reply; 10+ messages in thread
From: Milan Broz @ 2010-11-16 9:25 UTC (permalink / raw)
To: Igor Novgorodov; +Cc: dm-crypt
On 11/16/2010 08:31 AM, Igor Novgorodov wrote:
> I've tried to apply this patch against 2.6.36 and 2.6.37-rc2
> but without success:
>
> # patch -p1 -i ./dm-crypt-patch.diff
It applies cleanly to 2.6.37-rc1 and above.
For 2.6.36 small change is needed.
You can download both versions here for now:
http://mbroz.fedorapeople.org/dm-crypt/
Milan
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dm-crypt] AES-XTS performance
2010-11-16 9:25 ` Milan Broz
@ 2010-11-16 11:32 ` Igor Novgorodov
2010-11-16 12:00 ` Milan Broz
0 siblings, 1 reply; 10+ messages in thread
From: Igor Novgorodov @ 2010-11-16 11:32 UTC (permalink / raw)
To: Milan Broz; +Cc: dm-crypt
Здравствуйте, Milan.
Вы писали 16 ноября 2010 г., 12:25:22:
> On 11/16/2010 08:31 AM, Igor Novgorodov wrote:
>> I've tried to apply this patch against 2.6.36 and 2.6.37-rc2
>> but without success:
>>
>> # patch -p1 -i ./dm-crypt-patch.diff
> It applies cleanly to 2.6.37-rc1 and above.
It does not. I've tried 2.6.37-rc2 as i mentioned.
Copied & pasted the patch from your LKML post.
> For 2.6.36 small change is needed.
> You can download both versions here for now:
> http://mbroz.fedorapeople.org/dm-crypt/
Thanks, this patch for 2.6.36 applied fine.
Setup:
# echo '0 1000000000 zero' | dmsetup create zero1
# cryptsetup --cipher aes-xts-essiv:sha256 --key-size 512 --hash sha512 create c /dev/mapper/zero1
Benchmark with pure 2.6.36:
# dd if=/dev/mapper/c of=/dev/null bs=1M count=30000
30000+0 records in
30000+0 records out
31457280000 bytes (31 GB) copied, 128.674 s, 244 MB/s
# dd of=/dev/mapper/c if=/dev/zero bs=1M count=30000
30000+0 records in
30000+0 records out
31457280000 bytes (31 GB) copied, 129.512 s, 243 MB/s
Benchmark with your patch:
Read speed increased ~20%
# dd if=/dev/mapper/c of=/dev/null bs=1M count=30000
30000+0 records in
30000+0 records out
31457280000 bytes (31 GB) copied, 108.363 s, 290 MB/s
And according to `top` all kworker threads were runnning,
but they were using only a portion CPUs time:
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
2691 root 20 0 0 0 0 S 36 0.0 0:37.11 kworker/1:2
2784 root 20 0 0 0 0 S 26 0.0 0:04.59 kworker/5:1
2746 root 20 0 0 0 0 S 19 0.0 0:41.36 kworker/2:0
2780 root 20 0 9304 1400 516 D 19 0.0 0:07.91 dd
2781 root 20 0 0 0 0 S 17 0.0 0:07.36 kworker/6:1
2039 root 20 0 0 0 0 R 17 0.0 1:01.45 kworker/4:2
2350 root 20 0 0 0 0 S 15 0.0 0:43.15 kworker/0:2
2783 root 20 0 0 0 0 S 2 0.0 0:00.38 kworker/1:0
2750 root 20 0 0 0 0 S 2 0.0 0:22.71 kworker/5:0
2686 root 20 0 0 0 0 S 1 0.0 0:43.79 kworker/2:2
2695 root 20 0 0 0 0 S 1 0.0 0:42.46 kworker/6:2
2782 root 20 0 0 0 0 S 1 0.0 0:02.38 kworker/4:0
2752 root 20 0 0 0 0 S 1 0.0 0:20.96 kworker/0:1
But with the write speed we get a VERY HUGE speed improvement!:
# dd of=/dev/mapper/c if=/dev/zero bs=1M count=30000
30000+0 records in
30000+0 records out
31457280000 bytes (31 GB) copied, 37.2707 s, 844 MB/s
This time the threads are loaded much more:
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
2690 root 20 0 0 0 0 R 101 0.0 0:28.17 kworker/7:2
2750 root 20 0 0 0 0 R 101 0.0 0:43.14 kworker/5:0
2752 root 20 0 0 0 0 R 99 0.0 0:43.01 kworker/0:1
2695 root 20 0 0 0 0 R 91 0.0 1:05.82 kworker/6:2
2791 root 20 0 9304 1404 516 R 46 0.0 0:17.12 dd
2748 root 20 0 0 0 0 S 34 0.0 0:19.76 kworker/3:0
2746 root 20 0 0 0 0 R 28 0.0 1:08.36 kworker/2:0
2039 root 20 0 0 0 0 S 10 0.0 1:33.78 kworker/4:2
2783 root 20 0 0 0 0 S 10 0.0 0:28.28 kworker/1:0
2686 root 20 0 0 0 0 R 2 0.0 0:47.27 kworker/2:2
Such big difference between read and write speed is by design?
Or it is a problem of my setup? Maybe i should try to disable
hyperthreading and check again?
Anyway, it's a huge step forward from vanilla kernel's performance,
thanks! I'll keep testing this, and if any new patches will come out,
i'll gladly try them out too.
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dm-crypt] AES-XTS performance
2010-11-16 11:32 ` Igor Novgorodov
@ 2010-11-16 12:00 ` Milan Broz
2010-11-17 10:03 ` Igor Novgorodov
0 siblings, 1 reply; 10+ messages in thread
From: Milan Broz @ 2010-11-16 12:00 UTC (permalink / raw)
To: Igor Novgorodov; +Cc: dm-crypt
On 11/16/2010 12:32 PM, Igor Novgorodov wrote:
> Such big difference between read and write speed is by design?
> Or it is a problem of my setup? Maybe i should try to disable
> hyperthreading and check again?
That should be probably improved later.
(btw I just fixed stacking there, it was written by Andi Kleen).
Anyway, now I need to check that there is no known data corruption
with this approach and then we can add another patches on top of it.
(Targeted for 2.6.38, it missed 2.6.37 merge window already.)
(If anyone see some reproducible data corruption when using this patch,
please let me know.)
Milan
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dm-crypt] AES-XTS performance
2010-11-16 12:00 ` Milan Broz
@ 2010-11-17 10:03 ` Igor Novgorodov
0 siblings, 0 replies; 10+ messages in thread
From: Igor Novgorodov @ 2010-11-17 10:03 UTC (permalink / raw)
To: Milan Broz; +Cc: dm-crypt
> On 11/16/2010 12:32 PM, Igor Novgorodov wrote:
>> Such big difference between read and write speed is by design?
>> Or it is a problem of my setup? Maybe i should try to disable
>> hyperthreading and check again?
> That should be probably improved later.
> (btw I just fixed stacking there, it was written by Andi Kleen).
Okay, will be waiting for improved versions, thanks.
> Anyway, now I need to check that there is no known data corruption
> with this approach and then we can add another patches on top of it.
> (Targeted for 2.6.38, it missed 2.6.37 merge window already.)
> (If anyone see some reproducible data corruption when using this patch,
> please let me know.)
I've just been testing it on a loopback device with a portion of our
maildir, about 50G, 70k files. Copying in/out and comparing MD5 sums
showed no evidence of data corruption so far.
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dm-crypt] AES-XTS performance
2010-11-15 14:25 ` Milan Broz
2010-11-16 6:53 ` Igor Novgorodov
2010-11-16 7:31 ` Igor Novgorodov
@ 2010-11-17 23:39 ` Jakob-Tobias Winter
2 siblings, 0 replies; 10+ messages in thread
From: Jakob-Tobias Winter @ 2010-11-17 23:39 UTC (permalink / raw)
To: dm-crypt
[-- Attachment #1.1: Type: text/plain, Size: 1274 bytes --]
Hey Milan,
thank you for spending time on the long awaited multi-core-crypto-support!
On 11/15/2010 03:25 PM, Milan Broz wrote:
> If you want to do some tests, try this patch
> http://lkml.org/lkml/2010/11/12/344
I started out giving the patch a try on my desktop box but quickly ran
into disk IO limitations of just one HDD and so decided to grab some
spare metal and do this on a more performant system.
The test results are included as text-file as I fear the syntax of the
bonnie output will suffer if included directly in the mail, so please
exuse using an attachement. I hope most MUAs will end up displaying it
directly.
> (but there is still some issues and it will not help much
> if only one process generates IOs.)
Are you sure about that? Actually I also observed quite some performance
gain for single process IO.
In case you would like me to do some other comparisons, feel free to
point me in the right direction.
So far I also did not take time to check if it ends up eating the data,
but if it fails, I guess my desktop will let me know. Hooray for the
backup and black-magic-kernel-patch-users. ;)
By the way: As it seems, compiling the patched kernel breaks, if trying
to compile the AES stuff as modules.
Tobias
[-- Attachment #1.2: results.txt --]
[-- Type: text/plain, Size: 6060 bytes --]
Dell PowerEdge 1950 Raid10 Hardware Raid 4x 72Gb 15k SAS 8G RAM model Intel Xeon CPU E5405 @ 2.00GHz (Quadcore w/o hyperthreading)
Linux testkiste 2.6.36-wintix-unpatched-crypto #1 SMP Wed Nov 17 17:08:56 CET 2010 x86_64 GNU/Linux
testkiste:/mnt# bonnie++ -d ./ -c 4 -u root
Using uid:0, gid:0.
Writing a byte at a time...done
Writing intelligently...done
Rewriting...done
Reading a byte at a time...done
Reading intelligently...done
start 'em...done...done...done...done...done...
Create files in sequential order...done.
Stat files in sequential order...done.
Delete files in sequential order...done.
Create files in random order...done.
Stat files in random order...done.
Delete files in random order...done.
Version 1.96 ------Sequential Output------ --Sequential Input- --Random-
Concurrency 4 -Per Chr- --Block-- -Rewrite- -Per Chr- --Block-- --Seeks--
Machine Size K/sec %CP K/sec %CP K/sec %CP K/sec %CP K/sec %CP /sec %CP
testkiste 16G 820 99 193744 20 95649 13 2449 95 191911 11 1049 10
Latency 9951us 3592ms 1178ms 45264us 24906us 53383us
Version 1.96 ------Sequential Create------ --------Random Create--------
testkiste -Create-- --Read--- -Delete-- -Create-- --Read--- -Delete--
files /sec %CP /sec %CP /sec %CP /sec %CP /sec %CP /sec %CP
16 25935 93 +++++ +++ 25837 94 25378 91 +++++ +++ 21993 81
Latency 8491us 128us 244us 1013us 12us 7994us
1.96,1.96,testkiste,4,1290012956,16G,,820,99,193744,20,95649,13,2449,95,191911,11,1049,10,16,,,,,25935,93,+++++,+++,25837,94,25378,91,+++++,+++,21993,81,9951us,3592ms,1178ms,45264us,24906us,53383us,8491us,128us,244us,1013us,12us,7994us
testkiste:/mnt#
testkiste:/mnt_crypt# bonnie++ -d ./ -c 4 -u root
Using uid:0, gid:0.
Writing a byte at a time...done
Writing intelligently...done
Rewriting...done
Reading a byte at a time...done
Reading intelligently...done
start 'em...done...done...done...done...done...
Create files in sequential order...done.
Stat files in sequential order...done.
Delete files in sequential order...done.
Create files in random order...done.
Stat files in random order...done.
Delete files in random order...done.
Version 1.96 ------Sequential Output------ --Sequential Input- --Random-
Concurrency 4 -Per Chr- --Block-- -Rewrite- -Per Chr- --Block-- --Seeks--
Machine Size K/sec %CP K/sec %CP K/sec %CP K/sec %CP K/sec %CP /sec %CP
testkiste 16G 837 98 67741 6 36038 4 2571 98 101504 5 852.2 8
Latency 9562us 14773ms 11487ms 14082us 511ms 57357us
Version 1.96 ------Sequential Create------ --------Random Create--------
testkiste -Create-- --Read--- -Delete-- -Create-- --Read--- -Delete--
files /sec %CP /sec %CP /sec %CP /sec %CP /sec %CP /sec %CP
16 4570 17 +++++ +++ 4281 15 4666 17 +++++ +++ 3890 15
Latency 13172us 133us 8949us 12061us 38us 41450us
1.96,1.96,testkiste,4,1290018063,16G,,837,98,67741,6,36038,4,2571,98,101504,5,852.2,8,16,,,,,4570,17,+++++,+++,4281,15,4666,17,+++++,+++,3890,15,9562us,14773ms,11487ms,14082us,511ms,57357us,13172us,133us,8949us,12061us,38us,41450us
testkiste:/mnt_crypt#
Linux testkiste 2.6.36-wintix-patched-crypto #2 SMP Wed Nov 17 23:21:41 CET 2010 x86_64 GNU/Linux
testkiste:/mnt_crypt# bonnie++ -d ./ -c 4 -u root
Using uid:0, gid:0.
Writing a byte at a time...done
Writing intelligently...done
Rewriting...done
Reading a byte at a time...done
Reading intelligently...done
start 'em...done...done...done...done...done...
Create files in sequential order...done.
Stat files in sequential order...done.
Delete files in sequential order...done.
Create files in random order...done.
Stat files in random order...done.
Delete files in random order...done.
Version 1.96 ------Sequential Output------ --Sequential Input- --Random-
Concurrency 4 -Per Chr- --Block-- -Rewrite- -Per Chr- --Block-- --Seeks--
Machine Size K/sec %CP K/sec %CP K/sec %CP K/sec %CP K/sec %CP /sec %CP
testkiste 16G 809 98 136538 14 49701 5 1958 76 107338 4 1040 10
Latency 9889us 6065ms 5466ms 363ms 530ms 47273us
Version 1.96 ------Sequential Create------ --------Random Create--------
testkiste -Create-- --Read--- -Delete-- -Create-- --Read--- -Delete--
files /sec %CP /sec %CP /sec %CP /sec %CP /sec %CP /sec %CP
16 5279 19 +++++ +++ 4669 16 5234 19 +++++ +++ 3899 14
Latency 13465us 136us 15558us 12742us 91us 30820us
1.96,1.96,testkiste,4,1290031937,16G,,809,98,136538,14,49701,5,1958,76,107338,4,1040,10,16,,,,,5279,19,+++++,+++,4669,16,5234,19,+++++,+++,3899,14,9889us,6065ms,5466ms,363ms,530ms,47273us,13465us,136us,15558us,12742us,91us,30820us
testkiste:/mnt_crypt#
testkiste:/mnt_crypt# cryptsetup luksDump /dev/mapper/vg00-test
LUKS header information for /dev/mapper/vg00-test
Version: 1
Cipher name: aes
Cipher mode: cbc-essiv:sha256
Hash spec: sha1
Payload offset: 2056
MK bits: 256
MK digest: 94 20 85 7b fe a6 5e b3 e5 4c dc 11 36 e0 94 2c 63 2f e2 80
MK salt: 88 86 48 63 3c 6b 46 b7 dc 67 2f 89 02 df 78 cf
7e 50 f7 90 ef dd 8f 55 a6 7a 2b ea 0c d9 63 c4
MK iterations: 35625
UUID: 9b4e45b1-602b-4c1f-be36-10d0a98bbea5
Key Slot 0: ENABLED
Iterations: 142950
Salt: ba b6 9b f4 34 e4 4e 30 37 27 6b 7c 2a c2 de 17
f0 90 36 ae ca ab ec c3 7a 2b b5 de ff ed b2 15
Key material offset: 8
AF stripes: 4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
testkiste:/mnt_crypt#
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 262 bytes --]
^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2010-11-17 23:46 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2010-11-15 12:36 [dm-crypt] AES-XTS performance Igor Novgorodov
2010-11-15 14:25 ` Milan Broz
2010-11-16 6:53 ` Igor Novgorodov
2010-11-16 7:31 ` Igor Novgorodov
2010-11-16 9:25 ` Milan Broz
2010-11-16 11:32 ` Igor Novgorodov
2010-11-16 12:00 ` Milan Broz
2010-11-17 10:03 ` Igor Novgorodov
2010-11-17 23:39 ` Jakob-Tobias Winter
2010-11-15 14:38 ` Arno Wagner
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.