Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5A7DAC636D3 for ; Mon, 6 Feb 2023 18:17:35 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230119AbjBFSRd (ORCPT ); Mon, 6 Feb 2023 13:17:33 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38612 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230034AbjBFSRa (ORCPT ); Mon, 6 Feb 2023 13:17:30 -0500 Received: from mail-vs1-xe31.google.com (mail-vs1-xe31.google.com [IPv6:2607:f8b0:4864:20::e31]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BA19523D92; Mon, 6 Feb 2023 10:17:20 -0800 (PST) Received: by mail-vs1-xe31.google.com with SMTP id k4so13606418vsc.4; Mon, 06 Feb 2023 10:17:20 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=MDwl+agSBWVQ7d122A4RNEPR6bfEPctuIjqvgbGhfd8=; b=iCP5+tNGdTVVF12Sfh9yseeBlt8N31fMrzXT5iPl5m1sMVjW7vFx4nTmHJZ1lpCpES qnAdi+W2DgPgSQOPA/yfoLEJCM12sva8oaAZsHI4EcHle4yjSwNFNcdv+nToFvtcoepG FrvpYsglF7BzI10weX+U3yMZKoEHXZg6KGT2imqtfVKC5r9xTrMt/V+yTzWBhE/OPbFQ z7MFxThn0JrRaUmy4UMAscO9uRSID/8PQiRQI7BCXlkNEDPI8mpZ4k1l5p29Xd5JX1AL BmdPsfVBA2ugyaLdCRBUVYWUUl7xOhpfk9If1YksPWdw/KWZNOcNH1KBHorAAWY3Y6Vs F5BQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=MDwl+agSBWVQ7d122A4RNEPR6bfEPctuIjqvgbGhfd8=; b=eM6WvYbIdu3kgqKUNE0eBx98juzP23sshEm0ic/WOXDcSAopd80ZJBvNAgnVd8H/gC ZXF0cu5Pwc5BETMvj35E5iAIXYOQZKkoSse45i8jWqCiP+aCnZHtwOZc/ZBoEunx470j 61ccfPWNmIh7oAPPZOIBgwpfV+bbBIxPdyMUuUVtqEVQ0YQEdgSFAkJXq+w4TL3EAwT6 b7qn/xBaWz4MGzOgz8EwEPmxYRwMJSlCfR4ca+SswykGfviI8rq9XWDb2Ko8Zi7f++X7 EiKQmPq/MoKg06MzUM2kL0fhSYzPdzK7jFzhZPw63ePIn1DUespiuvPH4Q0GPfup6x7j wixQ== X-Gm-Message-State: AO0yUKXWXV/eoVrOoqWRUbD7RmE0FYttk80RxZWNbp95WscCKaon8Wvc cG3wEah28uRARrU3O5t9FUStOafbbNOJSR1zFoY= X-Google-Smtp-Source: AK7set9o8XiDbTlxHoztDYFURVxQmUGLwgCE0SQQWoxR036UTjrawf+vKWgyTgaM7xeUymNUtNosY8YbR5nyqCQ38VM= X-Received: by 2002:a67:a444:0:b0:3e9:6d7f:6f37 with SMTP id p4-20020a67a444000000b003e96d7f6f37mr128234vsh.3.1675707439751; Mon, 06 Feb 2023 10:17:19 -0800 (PST) MIME-Version: 1.0 References: <5fb32a1297821040edd8c19ce796fc0540101653.camel@redhat.com> <2ef122849d6f35712b56ffbcc95805672980e185.camel@redhat.com> <8ffa28f5-77f6-6bde-5645-5fb799019bca@linux.alibaba.com> <51d9d1b3-2b2a-9b58-2f7f-f3a56c9e04ac@linux.alibaba.com> <071074ad149b189661681aada453995741f75039.camel@redhat.com> <0d2ef9d6-3b0e-364d-ec2f-c61b19d638e2@linux.alibaba.com> <9c8e76a3-a60a-90a2-f726-46db39bc6558@linux.alibaba.com> <02edb5d6-a232-eed6-0338-26f9a63cfdb6@linux.alibaba.com> <3d4b17795413a696b373553147935bf1560bb8c0.camel@redhat.com> <5fbca304-369d-aeb8-bc60-fdb333ca7a44@linux.alibaba.com> In-Reply-To: From: Amir Goldstein Date: Mon, 6 Feb 2023 20:17:06 +0200 Message-ID: Subject: Re: [PATCH v3 0/6] Composefs: an opportunistically sharing verified image filesystem To: Miklos Szeredi Cc: Alexander Larsson , gscrivan@redhat.com, brauner@kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, david@fromorbit.com, viro@zeniv.linux.org.uk, Vivek Goyal , Josef Bacik , Gao Xiang , Jingbo Xu , overlayfs Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [+overlayfs list] On Mon, Feb 6, 2023 at 7:16 PM Amir Goldstein wrote: > > On Mon, Feb 6, 2023 at 6:34 PM Miklos Szeredi wrote: > > > > On Mon, 6 Feb 2023 at 14:31, Amir Goldstein wrote: > > > > > > > > > My little request again, could you help benchmark on your real workload > > > > > > rather than "ls -lR" stuff? If your hard KPI is really what as you > > > > > > said, why not just benchmark the real workload now and write a detailed > > > > > > analysis to everyone to explain it's a _must_ that we should upstream > > > > > > a new stacked fs for this? > > > > > > > > > > > > > > > > I agree that benchmarking the actual KPI (boot time) will have > > > > > a much stronger impact and help to build a much stronger case > > > > > for composefs if you can prove that the boot time difference really matters. > > > > > > > > > > In order to test boot time on fair grounds, I prepared for you a POC > > > > > branch with overlayfs lazy lookup: > > > > > https://github.com/amir73il/linux/commits/ovl-lazy-lowerdata > > > > > > > > Sorry about being late to the party... > > > > > > > > Can you give a little detail about what exactly this does? > > > > > > > > > > Consider a container image distribution system, with base images > > > and derived images and instruction on how to compose these images > > > using overlayfs or other methods. > > > > > > Consider a derived image L3 that depends on images L2, L1. > > > > > > With the composefs methodology, the image distribution server splits > > > each image is split into metadata only (metacopy) images M3, M2, M1 > > > and their underlying data images containing content addressable blobs > > > D3, D2, D1. > > > > > > The image distribution server goes on to merge the metadata layers > > > on the server, so U3 = M3 + M2 + M1. > > > > > > In order to start image L3, the container client will unpack the data layers > > > D3, D2, D1 to local fs normally, but the server merged U3 metadata image > > > will be distributed as a read-only fsverity signed image that can be mounted > > > by mount -t composefs U3.img (much like mount -t erofs -o loop U3.img). > > > > > > The composefs image format contains "redirect" instruction to the data blob > > > path and an fsverity signature that can be used to verify the redirected data > > > content. > > > > > > When composefs authors proposed to merge composefs, Gao and me > > > pointed out that the same functionality can be achieved with minimal changes > > > using erofs+overlayfs. > > > > > > Composefs authors have presented ls -lR time and memory usage benchmarks > > > that demonstrate how composefs performs better that erofs+overlayfs in > > > this workload and explained that the lookup of the data blobs is what takes > > > the extra time and memory in the erofs+overlayfs ls -lR test. > > > > > > The lazyfollow POC optimizes-out the lowerdata lookup for the ls -lR > > > benchmark, so that composefs could be compared to erofs+overlayfs. > > > > Got it, thanks. > > > > > > > > To answer Alexander's question: > > > > > > > Cool. I'll play around with this. Does this need to be an opt-in > > > > option in the final version? It feels like this could be useful to > > > > improve performance in general for overlayfs, for example when > > > > metacopy is used in container layers. > > > > > > I think lazyfollow could be enabled by default after we hashed out > > > all the bugs and corner cases and most importantly remove the > > > POC limitation of lower-only overlay. > > > > > > The feedback that composefs authors are asking from you > > > is whether you will agree to consider adding the "lazyfollow > > > lower data" optimization and "fsverity signature for metacopy" > > > feature to overlayfs? > > > > > > If you do agree, the I think they should invest their resources > > > in making those improvements to overlayfs and perhaps > > > other improvements to erofs, rather than proposing a new > > > specialized filesystem. > > > > Lazy follow seems to make sense. Why does it need to be optional? > > It doesn't. > > > Does it have any advantage to *not* do lazy follow? > > > > Not that I can think of. > > > Not sure I follow the fsverity requirement. For overlay+erofs case > > itsn't it enough to verify the erofs image? > > > > it's not overlay{erofs+erofs} > it's overlay{erofs+ext4} (or another fs-verity [1] supporting fs) > the lower layer is a mutable fs with /objects/ dir containing > the blobs. > > The way to ensure the integrity of erofs is to setup dm-verity at > erofs mount time. > > The way to ensure the integrity of the blobs is to store an fs-verity > signature of each blob file in trusted.overlay.verify xattr on the > metacopy and for overlayfs to enable fsverity on the blob file before > allowing access to the lowerdata. > Perhaps I should have mentioned that the lower /objects dir, despite being mutable (mostly append-only) is shared among several overlays. This technically breaks the law of no modification to lower layer, but the /objects dir itself is a whiteout in the metadata layer, so the blobs are only accessible via absolute path redirect and there is no /objects overlay dir, so there is no readdir cache to invalidate. Naturally, the content addressable blobs are not expected to be renamed/unlinked while an overlayfs that references them is mounted. Thanks, Amir.