-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Encrypted ZFS performance issues #103
Comments
I have the same problem on the two Macs I tested, with the same version of ZFS as yours. One is an iMac with an i5-5675R on macOS 10.15.7 (kernel I tested on a RAM disk (see my script) with As a comparison, Here are the results for the iMac
MacBook Air
And here are the results of iMac
MacBook Air
|
We should now be detecting the correct CPUID features (yikes) and use AESNI when available. This could also be why AVX fails - need to test that separately. There is a test PKG on the forum for those we can test it: https://openzfsonosx.org/forum/viewtopic.php?f=26&t=3651&p=11593#p11588 |
Has this performance issue been fixed in version OpenZFSonOsX-2.1.0-Catalina-10.15? I have not been able to get on to the openzfsonosx.org forum... site appears to be down. |
The website is broken at the moment due to a problem with the server that runs the vm's. |
It's nothing I'd consider urgent... was going to try the test PKG linked above. Is there a way to get that PKG from github? |
System information
Summary of Problem
Poor read performance on encrypted ZFS dataset.
I have a 12 disk zraid2 zvol in a zpool. The disks I'm using are ST4000NM0033, Dell branded with Firmware GA6E.
Reading and writing from the non-encrypted dataset works as expected with speeds exceeding 500 mbytes/s.
When reading from the encrypted dataset the performance goes way down, and any random I/O will bring the system to a crawl. Writing to the dataset causes the CPU load to go to 600%. A program such as thunderbird is almost unusable on the encrypted ZFS dataset.
I've tested this against a ZFS dataset with an encrypted APFS container and it has performed much better than native ZFS encryption.
Describe how to reproduce the problem
I created a random 10gb file by concatenating 10 copies of 1g from /dev/urandom
My encrypted pool is mounted on /Users/bryan/
I did the following while logged in as root and no processes were accessing the dataset
Include any warning/errors/backtraces from the system logs
I've attached three spindumps during these operation and one while unison was running.
zfs-read-from-crypto-dataset-Spindump.txt
zfs-while-unison-running-Spindump.txt
zfs-write-to-crypto-big-dataset-Spindump.txt
zpool layout:
The text was updated successfully, but these errors were encountered: