On Feb 09 2016, Kai Krakow <hurikha...@gmail.com> wrote: >> If there's no way to put LVM anywhere into the stack that'd be a >> bummer, I very much want to use dm-crypt (and I guess that counts as >> lvm?). > > Wasn't there plans for integrating per-file encryption into btrfs (like > there's already for ext4)? I think this could pretty well obsolete your > plans - except you prefer full-device encryption.
Well, it could obsolete it once the plan turns into an implementation, but not today :-). > If you don't put encryption below the bcache caching device, everything > going to the cache won't be encrypted - so that's probably what you are > having to do anyways. No, I could use put separate encryption layers between bcache and the disk - for both the backing and the caching device. > But I don't know how such a setup recovers from power outage, I'm not > familiar with dm-crypt at all, how it integrates with maybe initrd > etc. Initrd is not a concern. You can put on it whatever is needed to set up the stack. As far as power outages is concerned, I think dm-crypt doesn't change anything - it's an intermediate layer with no caching. Any write gets passed through synchronously. > The caching device is treated dirty always. That means, it replays all > dirty data automatically during device discovery. Backing and caching > create a unified pair - that's why the superblock is needed. It saves > you from accidently using the backing without the cache. So even after > unclean shutdown, from the user-space view, the pair is always > consistent. Bcache will only remove persisted data from its log if it > ensured it was written correctly to the backing. The backing on its > own, however, is not guaranteed to be consistent at any time - except > you cleanly stop bcache and disconnect the pair (detach the cache). > > When dm-crypt comes in, I'm not sure how this is handled - given that > the encryption key must be loaded from somewhere... Someone else may > have a better clue here. The encryption keys are supplied by userspace when setting up the device. > So actually there's two questions: > > 1. Which order of stacking makes more sense and is more resilient to > errors? I think in an ideal world (i.e, no software bugs), inserting dm-crypt anywhere in the stack will not make a difference at all even when there is a crash. Thus... > 2. Which order of stacking is exhibiting bugs? ..indeed becomes the important question. Now if only someone had an answer :-). Best, -Nikolaus -- GPG encrypted emails preferred. Key id: 0xD113FCAC3C4E599F Fingerprint: ED31 791B 2C5C 1613 AF38 8B8A D113 FCAC 3C4E 599F »Time flies like an arrow, fruit flies like a Banana.« -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html