On 01/07/2011 10:26 AM, Darren J Moffat wrote:
> On 06/01/2011 23:07, David Magda wrote:
>> On Jan 6, 2011, at 15:57, Nicolas Williams wrote:
>>
>>> Fletcher is faster than SHA-256, so I think that must be what you're
>>> asking about: "can Fletcher+Verification be faster than
>>> Sha256+NoVerification?"  Or do you have some other goal?
>>
>> Would running on recent T-series servers, which have have on-die
>> crypto units, help any in this regard?
>
> The on chip SHA-256 implementation is not yet used see:
>
> http://blogs.sun.com/darren/entry/improving_zfs_dedup_performance_via
>
> "Note that the fix I integrated only uses a software implementation of
> SHA256 on the T5120 (UltraSPARC T2) and is not (yet) using the on CPU
> hardware implementation of SHA256.  The reason for this is to do with
> boot time availability of the Solaris Cryptographic Framework and the
> need to have ZFS as the root filesystem."
>
> Not yet changed it turns out to be quite complicated to fix due to
> very early boot issues.
>
Would it be difficult to implement both methods and allow ZFS to switch
to the hardware-accelerated crypto backend at runtime after it has been
brought up and initialized? It seems like one heck of a feature
(essentially removing most of the computational complexity of dedup).

--
Saso
_______________________________________________
zfs-discuss mailing list
zfs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/zfs-discuss

Reply via email to