[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

How to optimise encrypted filesystems on an SSD?

Hi there.

For a while I've been using LUKS/dm-crypt with LVM2 to secure hard
drives in laptops and servers. Recently I've moved one of my filesystems
onto a solid-state drive (Intel X25-M-G2 80GB with latest firmware).

There are some excellent instructions here
on how to align ext4 and LVM to the erase block size of the SSD. However
I've not been able to find a recipe for optimising an encrypted
filesystem in the same way.

A typical usage case for me would be this, from following defaults for
encrypted lvm on the Debian installer:

/dev/sda1 79GB crypt-luks
/dev/mapper/sda1_crypt holds PV for LVM2
     PV has a VG with two LVs, 4GB swap and the rest for ext4 /
/dev/sda5 256MB ext2 /boot

Could anyone explain how I might go about aligning/optimising this, or
point me to some instructions? Am I better putting lvm over luks or luks
over lvm? Or something entirely different?

Thanks in advance,

Attachment: signature.asc
Description: OpenPGP digital signature

dm-crypt mailing list

[DM Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

Add to Google Powered by Linux