lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <0787C579-7E2C-4864-B8F4-98816E1E50A2@dilger.ca> Date: Thu, 5 Sep 2013 23:10:31 -0600 From: Andreas Dilger <adilger@...ger.ca> To: Thavatchai Makphaibulchoke <thavatchai.makpahibulchoke@...com> Cc: Theodore Ts'o <tytso@....edu>, T Makphaibulchoke <tmac@...com>, Al Viro <viro@...iv.linux.org.uk>, "linux-ext4@...r.kernel.org List" <linux-ext4@...r.kernel.org>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, "linux-fsdevel@...r.kernel.org Devel" <linux-fsdevel@...r.kernel.org>, aswin@...com, Linus Torvalds <torvalds@...ux-foundation.org>, aswin_proj@...ups.hp.com Subject: Re: [PATCH v3 0/2] ext4: increase mbcache scalability On 2013-09-05, at 3:49 AM, Thavatchai Makphaibulchoke wrote: > On 09/05/2013 02:35 AM, Theodore Ts'o wrote: >> How did you gather these results? The mbcache is only used if you >> are using extended attributes, and only if the extended attributes don't fit in the inode's extra space. >> >> I checked aim7, and it doesn't do any extended attribute operations. >> So why are you seeing differences? Are you doing something like >> deliberately using 128 byte inodes (which is not the default inode >> size), and then enabling SELinux, or some such? > > No, I did not do anything special, including changing an inode's size. I just used the profile data, which indicated mb_cache module as one of the bottleneck. Please see below for perf data from one of th new_fserver run, which also shows some mb_cache activities. > > > |--3.51%-- __mb_cache_entry_find > | mb_cache_entry_find_first > | ext4_xattr_cache_find > | ext4_xattr_block_set > | ext4_xattr_set_handle > | ext4_initxattrs > | security_inode_init_security > | ext4_init_security Looks like this is some large security xattr, or enough smaller xattrs to exceed the ~120 bytes of in-inode xattr storage. How big is the SELinux xattr (assuming that is what it is)? > Looks like it's a bit harder to disable mbcache than I thought. > I ended up adding code to collect the statics. > > With selinux enabled, for new_fserver workload of aim7, there > are a total of 0x7e05420100000000 ext4_xattr_cache_find() calls > that result in a hit and 0xc100000000000000 calls that are not. > The number does not seem to favor the complete disabling of > mbcache in this case. This is about a 65% hit rate, which seems reasonable. You could try a few different things here: - disable selinux completely (boot with "selinux=0" on the kernel command line) and see how much faster it is - format your ext4 filesystem with larger inodes (-I 512) and see if this is an improvement or not. That depends on the size of the selinux xattrs and if they will fit into the extra 256 bytes of xattr space these larger inodes will give you. The performance might also be worse, since there will be more data to read/write for each inode, but it would avoid seeking to the xattr blocks. Cheers, Andreas -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists