From nobody Mon Apr 15 22:01:59 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4VJLk01k0Dz5HB9J for ; Mon, 15 Apr 2024 22:02:00 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4VJLjz3Qxpz4lt5 for ; Mon, 15 Apr 2024 22:01:59 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1713218519; a=rsa-sha256; cv=none; b=hB/hLof9Wt/PhaAAesBgnNZpPU7yMk6MemNyQAlclZjzyg9kSJsyoC6mXhVsIB23mWrNSC L7yG7dIEfREKzz7JRg/jzbJ/1y7yhPSqcQ4qPjBKQToyLA8oqWHGalZ246bW5qwOo/pZFg e/eMP/c4fdSmWtd0V9KVzTD/uX7lfgLHy1UUpRG+4BLx1TT/Khfh3fpQ9reqCzJ/cDBRku bzMdMeYtSkabWN6McOQqZaX142DgA68ACIeZqwhLvt8FMsj9dBaLjHn8Ok5lR7IoRG6GtN phCYlJHHIzlhDkmNWG/tVID4cBDYG6S+A+klBVMZJUcMVRxWCJlLLyGHTJdlvw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1713218519; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Yt+La+WGbCj8vkPB4HwFkSZEab9uY/QBco9lv2BV84Q=; b=UFnfBMoSPqcc3N0sOWnKxW9gUtQyOnm9aZEwfUuPBiSidop0mEUlRn1L/e2a63IhI5v9yL iyaJTaYbdNqDHZjptWV3fC6ITuKulUuJ87fRmjvnCmeO5obEtpetMrP81zwJ3UgG/5uKLS WRTtD7/irPLj3jN40umE56/a5e7S4SlOIbDFI4non56B9FxD6jZb0v0H1bQGbfhsm8kQcO wEPup+jDh6lzAs0OOLdsVQkMWX3z93Sy2KDDpvllDkg3F9Q9ozmZpeBf++MuxnHuTvAReq MPtkXy2H6fYkxrTnGVRCLlqkzNvg2REHHhbDHZTndADTAdCKPQKV5pc9GJqaiQ== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4VJLjz2zlgzHR4 for ; Mon, 15 Apr 2024 22:01:59 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 43FM1x1v076239 for ; Mon, 15 Apr 2024 22:01:59 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 43FM1xUL076238 for bugs@FreeBSD.org; Mon, 15 Apr 2024 22:01:59 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 193124] GELI data integrity verification should consider sparse zero pass-through Date: Mon, 15 Apr 2024 22:01:59 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 10.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: delphij@FreeBSD.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: Not Accepted X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc resolution bug_status Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D193124 Xin LI changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |delphij@FreeBSD.org Resolution|--- |Not Accepted Status|New |Closed --- Comment #1 from Xin LI --- Although I think this is an useful feature request to some extent, it's not really trivial to implement because in order to support it the GELI model h= as to keep track of which block is presumed to be zero's, and that bookkeeping information has to be stored somewhere. There are legitimate reasons to al= ways perform full initialization of the provider, by the way, because the size of data stored in the encrypted storage is revealed if that's not done, for example. A more generic solution would probably be making GELI init to perform the initialization in background and have it mark the provider as "need initialization", and upon attach the provider initializes itself in the background. This, however, would complicate the provider quite a bit becau= se it needs to be able to recover from power outage, etc. without damaging dat= a.=20 (This may be a good candidate for a summer of project project). --=20 You are receiving this mail because: You are the assignee for the bug.=