Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp10479431rwd; Thu, 22 Jun 2023 00:03:24 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ43WoqdU+RYLzYm0QH3xuR8Jagz5JYB86ZUuIVjDtuQGhCSLc/K5aPjlS0hNT/wl82ZR0+n X-Received: by 2002:a92:de08:0:b0:342:28f1:75ae with SMTP id x8-20020a92de08000000b0034228f175aemr13393479ilm.12.1687417404415; Thu, 22 Jun 2023 00:03:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687417404; cv=none; d=google.com; s=arc-20160816; b=gxiNdnh3YBSNs9ztCdX/ZSaSs3lDZHsoJipYNE7ZYejxf+baLUup50dka4zNMgP7Ke 88J5+7ukY3pI4dCtCjlj+7j1e5siFkAe3PVZW0H3zqh4wEDMKkEbIOl76ilkl++bAs22 oQLXbG742u4J3D6j2r51Bjr7p2h7AYA9uH3G6lHxG42ynBhU84b0WgExPJ9edaO3pUzo SfqQ8tI3SWm04gTGCoEMcRnljQVXhKUJXH4Y7kKd1JQWLsXqcN3x9VsYvTq9VbB2ttBS /utOVpY+aHnZ0VlbdxzmuYWVasbfyfpTBblRJR215n7356Lp1j38ZKNwLksSKGogiLIj u2eg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:references:cc:to:subject:user-agent:mime-version :date:message-id; bh=5+MWuLw5UUl2V432dsyDbqd8ow7VfN+v7NFWMXWBQkQ=; b=k+AX1XDRrdIFdquJ3stbEgkHuDdlivyCUJdP6mJ0kKvqLnH2ILgMyue2iXVuLJr1xA mu/c8/bA2dlnUm3zAbdrSolzS8zIUHEDCETkR2ibM3R5eC1KOjBZ1FbU7xz5fvNUBX1F fAsG0sITMhg4azAjWpPtuVeiz5Zk4oVdUb2zl0/DfFclC0S8TrjRQE5KFjM0+JfmBSQa HykwesZ04ub4B8K2WsIg+zPOQ06QkFKrCYO4Dri9WCLybwLs5XfKCLhFYa+yDOMJgFco 8jv07RkM4yn+B+Tx0XmUhbmLxPbtUhFAJgHiUCs8f8DjMcCqLtA2vt4J8HOLq2geJYAV MpjA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o17-20020a637311000000b0054fa5f25cfasi429200pgc.568.2023.06.22.00.03.12; Thu, 22 Jun 2023 00:03:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230060AbjFVGhJ (ORCPT + 99 others); Thu, 22 Jun 2023 02:37:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51330 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229437AbjFVGhI (ORCPT ); Thu, 22 Jun 2023 02:37:08 -0400 Received: from out30-100.freemail.mail.aliyun.com (out30-100.freemail.mail.aliyun.com [115.124.30.100]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2860D132 for ; Wed, 21 Jun 2023 23:37:05 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R201e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018045168;MF=jefflexu@linux.alibaba.com;NM=1;PH=DS;RN=6;SR=0;TI=SMTPD_---0VliIWD4_1687415818; Received: from 192.168.31.58(mailfrom:jefflexu@linux.alibaba.com fp:SMTPD_---0VliIWD4_1687415818) by smtp.aliyun-inc.com; Thu, 22 Jun 2023 14:37:00 +0800 Message-ID: <3730215c-d59d-8b8e-fe36-7754f7782d15@linux.alibaba.com> Date: Thu, 22 Jun 2023 14:36:57 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.12.0 Subject: Re: [RFC 0/2] erofs: introduce bloom filter for xattr To: Alexander Larsson Cc: hsiangkao@linux.alibaba.com, chao@kernel.org, huyue2@coolpad.com, linux-erofs@lists.ozlabs.org, linux-kernel@vger.kernel.org References: <20230621083209.116024-1-jefflexu@linux.alibaba.com> Content-Language: en-US From: Jingbo Xu In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-10.0 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 6/21/23 7:50 PM, Alexander Larsson wrote: > On Wed, Jun 21, 2023 at 10:32 AM Jingbo Xu wrote: >> >> Background >> ========== >> Filesystems with ACL enabled generally need to read >> "system.posix_acl_access"/"system.posix_acl_default" xattr to get the >> access and default ACL. When filesystem is mounted with ACL enabled >> while files in the system have not set access/default ACL, the getattr() >> will run in vain while the round trip can decrease the performance in >> workload like "ls -lR". >> >> For example, there's a 12% performance boost if erofs is mounted with >> "noacl" when running "ls -lR" workload on dataset [1] (given in [2]). >> >> We'd better offer a fastpath to boost the above workload, as well as >> other negative xattr lookup. >> >> >> Proposal >> ======== >> Introduce a per-inode bloom filter for xattrs to boost the negative >> xattr queries. >> >> As following shows, a 32-bit bloom filter is introduced for each inode, >> describing if a xattr with specific name exists on this inode. >> >> ``` >> struct erofs_xattr_ibody_header { >> - __le32 h_reserved; >> + __le32 h_map; /* bloom filter */ >> ... >> } >> ``` >> >> Following are some implementation details for bloom filter. >> >> 1. Reverse bit value >> -------------------- >> The bloom filter structure describes if a given data is inside the set. >> It will map the given data into several bits of the bloom filter map. >> The data must not exist inside the set if any mapped bit is 0, while the >> data may be not inside the set even if all mapped bits is 1. >> >> While in our use case, as erofs_xattr_ibody_header.h_map is previously a >> (all zero) reserved field, the bit value for the bloom filter has a >> reverse semantics in consideration for compatibility. That is, for a >> given data, the mapped bits will be cleared to 0. Thus for a previously >> built image without support for bloom filter, the bloom filter is all >> zero and when it's mounted by the new kernel with support for bloom >> filter, it can not determine if the queried xattr exists on the inode and >> thus will fallback to the original routine of iterating all on-disk >> xattrs to determine if the queried xattr exists. >> >> >> 2. The number of hash functions >> ------------------------------- >> The optimal value for the number of the hash functions (k) is (ln2 * >> m/n), where m stands the number of bits of the bloom filter map, while n >> stands the number of all candidates may be inside the set. >> >> In our use case, the number of common used xattr (n) is approximately 8, >> including system.[posix_acl_access|posix_acl_default], >> security.[capability|selinux] and >> security.[SMACK64|SMACK64TRANSMUTE|SMACK64EXEC|SMACK64MMAP]. >> >> Given the number of bits of the bloom filter (m) is 32, the optimal value >> for the number of the hash functions (k) is 2 (ln2 * m/n = 2.7). > > This is indeed the optimal value in a traditional use of bloom > filters. However, I think it is based on a much larger set of values. > For this usecase it may be better to choose a different value. > > I did some research a while ago on this, and I thought about the > counts too. Having more than one hash function is useful because it > allows you to avoid problems if two values happen to hash to the same > bucket, but this happens at the cost of there being less "unique > buckets". I spent some time looking for common xattr values > (including some from userspace) and ended up with a list of about 30. Yeah, if the number of common used xattr (n) is 30, then the optimal value for the number of the hash functions (k) is 1 (ln2 * m/n = 0.74). The optimal value in theory also matches our intuition. > If we can choose a single hash function that maps all (or most) of > these to a unique bucket (mod 32), Excellent research! Would you mind sharing the list of these approximately 30 commonly used xattrs, so that I could check if they are mapped to unique bucket with the single hash function we proposed? -- Thanks, Jingbo