Received: by 2002:a05:7412:f589:b0:e2:908c:2ebd with SMTP id eh9csp855206rdb; Wed, 1 Nov 2023 05:05:29 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHLRDMPFIwMZjNK3IJwDXl3KVNyHK+XPrMbxL/cF1iZ20Iwn6ETpDMWg6DOQrbj0aKGJZI+ X-Received: by 2002:a05:6a00:d4d:b0:68a:6d34:474b with SMTP id n13-20020a056a000d4d00b0068a6d34474bmr2941465pfv.15.1698840328575; Wed, 01 Nov 2023 05:05:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698840328; cv=none; d=google.com; s=arc-20160816; b=QB0a5KKgUywrLWaxELG1/bPC+tHULJHJKQpVZQzAJNfA/KLbxFaluu6VBCptsFAYop zez/f9t5Fx6JyQZ2752B9pMVE+l+GAdG6q8G7Vsoco3t4y7Zu9IXqXB4o4k3H2BjNJo1 JsODN/m+HET9WjVx8zzm5aR1n+jW0Y7EO7alfgHuXjmOrJdaOPEX0xgfWLVqLL75pxEW 3Bki8NNIjUhvnQTzOxUdyhJhqZj3ezYMW4M7hRTeVUWw9AUZ+0X5UeUi08+Ze/pzN/Qv OoZNN6zFeYnju1QGXyjHsg74KpaCejVY4PEwgmd0e2a9fImSc9vvpVGDyf7Oo0rEVRbo CtCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:reply-to :from:references:cc:to:content-language:subject:user-agent :mime-version:date:message-id; bh=tDojNTGdff1a26ZlTMsOFH9r5d/69ydk4cOc8RQ6e3o=; fh=FTYvrStMzzI5SsWszT2bkhVcmxXOpgycmRUvmHYkOtA=; b=VuRWy/p6i9/rr0OGLf+yXR+ywx0K8hIv5ZsnD71fWtDRSLnPvJ0m8C5oChTffp8Nny YnMayPvjUvEXWzAeG71tJcZwNa51OfqDjkplt6kBsAo3r65Mm1hTSIKKJMU+4mwYMDEH qD7Cy+kItCjweYMji/0Z5Bu61l/mIGcBu+hmqKa4KS8VN4SVD06iLjrbAqEG26iGX8wO cIldD6nmKYv2V6ma1Tqf4yZ72HFNF2jWU83UQ1zYnz40C5J63lQ+9XOUjkMb1GeC56O+ NhAr5LUIKIZ0f5hxUhMcV79SZdcJCXITXLgJxlxXnj+l0jiHTClfObN683QzPmnAV0Se HbTA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from fry.vger.email (fry.vger.email. [23.128.96.38]) by mx.google.com with ESMTPS id c19-20020a056a000ad300b006c128a8123bsi1518955pfl.212.2023.11.01.05.05.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 01 Nov 2023 05:05:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) client-ip=23.128.96.38; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 4C3C28084042; Wed, 1 Nov 2023 05:04:57 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235308AbjKAME5 (ORCPT + 99 others); Wed, 1 Nov 2023 08:04:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55516 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231463AbjKAME5 (ORCPT ); Wed, 1 Nov 2023 08:04:57 -0400 Received: from wp530.webpack.hosteurope.de (wp530.webpack.hosteurope.de [80.237.130.52]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 52237F7 for ; Wed, 1 Nov 2023 05:04:51 -0700 (PDT) Received: from [2a02:8108:8980:2478:8cde:aa2c:f324:937e]; authenticated by wp530.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) id 1qy9xo-0001cN-9r; Wed, 01 Nov 2023 13:04:48 +0100 Message-ID: <070dd167-9278-42fa-aef5-66621a602fd3@leemhuis.info> Date: Wed, 1 Nov 2023 13:04:45 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [REGRESSION] dm_crypt essiv ciphers do not use async driver mv-aes-cbc anymore Content-Language: en-US, de-DE To: Yureka Cc: linux-crypto@vger.kernel.org, regressions@lists.linux.dev, Mikulas Patocka , dm-devel@redhat.com, Boris Brezillon , Arnaud Ebalard , Srujana Challa , Eric Biggers References: <53f57de2-ef58-4855-bb3c-f0d54472dc4d@yuka.dev> <20230929224327.GA11839@google.com> From: "Linux regression tracking (Thorsten Leemhuis)" Reply-To: Linux regressions mailing list In-Reply-To: <20230929224327.GA11839@google.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-bounce-key: webpack.hosteurope.de;regressions@leemhuis.info;1698840291;2c6ccb74; X-HE-SMSGID: 1qy9xo-0001cN-9r X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Wed, 01 Nov 2023 05:04:57 -0700 (PDT) n 30.09.23 00:43, Eric Biggers wrote: > On Fri, Sep 29, 2023 at 11:08:55PM +0200, Yureka wrote: >> >> I am running the NixOS distribution cross-compiled from x86_64 to a Marvell >> Armada 388 armv7 SoC. >> >> I am not getting expected speeds when reading/writing on my encrypted hard >> drive with 6.5.5, while it is fast on 5.4.257. Volume is formatted like this: >> `cryptsetup luksFormat -c aes-cbc-essiv:sha256 /dev/sda`. >> >> Specifically, I tracked this down to the changes to crypto/essiv.c from >> 7bcb2c99f8ed mentioned above. Reverting those changes on top of a 6.5.5 kernel >> provides working (see applicable diff further below). >> >> I'm *guessing* that this is related to the mv-aes-cbc crypto driver (from the >> marvell-cesa module) being registered as async (according to /proc/crypto), >> and I *suspect* that async drivers are not being used anymore by essiv or >> dm_crypt. Going by the commit description, which sounds more like a refactor, >> this does not seem intentional. > > This is actually from commit b8aa7dc5c753 ("crypto: drivers - set the flag > CRYPTO_ALG_ALLOCATES_MEMORY"), which set CRYPTO_ALG_ALLOCATES_MEMORY in > marvell-cesa. 7bcb2c99f8ed is just one of the prerequisite commits. > > I understand that the dm-crypt developers did this as an intentional bug fix in > order to prevent dm-crypt from using crypto drivers that are known to cause > deadlocks due to allocating memory during requests. > > If you are interested in still being able to use marvell-cesa with dm-crypt, I > believe it would need to be fixed to meet the requirements for not needing > CRYPTO_ALG_ALLOCATES_MEMORY. I've Cc'ed the maintainers of that driver. > > #regzbot introduced: b8aa7dc5c753 BTW: Eric, thx for this. Boris, Arnaud, Srujana, and Mikulas, could you maybe comment on this? I understand that this is not some everyday regression due to deadlock risk, but it nevertheless would be good to get this resolved somehow to stay in line with our "no regressions" rule. Ciao, Thorsten (wearing his 'the Linux kernel's regression tracker' hat) -- Everything you wanna know about Linux kernel regression tracking: https://linux-regtracking.leemhuis.info/about/#tldr If I did something stupid, please tell me, as explained on that page. #regzbot poke