Announcement

Collapse
No announcement yet.

AES-NI XTS To See 2~3x Performance Recovery After Regressing Hard From Retpolines

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • AES-NI XTS To See 2~3x Performance Recovery After Regressing Hard From Retpolines

    Phoronix: AES-NI XTS To See 2~3x Performance Recovery After Regressing Hard From Retpolines

    It turns out the Intel/AMD AES-NI implementation of XTS regressed hard from the Retpolines functionality merged nearly three years ago for mitigating Spectre... But now the crypto performance with the AES-NI XTS implementation is set to recover from that regression with a huge improvement thanks to a new set of patches...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    "AES-NI XTS"

    I first thought it is an article about Elons child

    Comment


    • #3
      So, apparently this can be compared using 'cryptsetup benchmark' ?

      Comment


      • #4
        So, apparently this can be compared using 'cryptsetup benchmark' ?
        Kind of. cryptsetup benchmark uses the userspace interface to the kernel crypto API (AF_ALG). So it has a lot of overhead, and it isn't good for benchmarking algorithms that are very fast, such as AES-NI accelerated algorithms. It will show some improvement, but probably not the 2x that was seen in an in-kernel benchmark.

        Comment


        • #5
          Ah, so that's why my disk access got so slow. Nice improvement.

          Comment


          • #6
            That's cool.

            From what I understand, there is more that can be done to improve performance a lot for certain loads, admittedly not loads typically relevant to most applications.

            I've read that dmcrypt/kcrytpd (as opposed to cryptsetup) is async with using queues etc, and affects latency. Which I think isn't normally a problem, but shows up in fio based direct random 4k read/write tests compared to no crypt when using a non bandwidth limited block device (demonstrated on a ramdisk, but maybe relevant for some crazy nvme setups?).

            For the likes of CloudFlare apparently this is relevant, they suggest the the patches from the following email chain makes using dmcrypt in their caching remove patchy response times:



            Comment


            • #7
              ... and no one knows where this obtrusive and overbloated mitigation crap shoots next ...
              (that's to strenghten the point h/w issues of such a scale should be fixed in h/w and not mitigated in software)

              Comment


              • #8
                So performance is 2-3x better than the regressed performance? How does that compare to without the mitigation regressed performance? Is it back to parity, close to, or still quite a bit slower?...or faster than it used to be without mitigations as well?

                Comment

                Working...
                X