kernel_optimize_test/fs/ext4
Eric Biggers fd39073dba fs-verity: implement readahead of Merkle tree pages
When fs-verity verifies data pages, currently it reads each Merkle tree
page synchronously using read_mapping_page().

Therefore, when the Merkle tree pages aren't already cached, fs-verity
causes an extra 4 KiB I/O request for every 512 KiB of data (assuming
that the Merkle tree uses SHA-256 and 4 KiB blocks).  This results in
more I/O requests and performance loss than is strictly necessary.

Therefore, implement readahead of the Merkle tree pages.

For simplicity, we take advantage of the fact that the kernel already
does readahead of the file's *data*, just like it does for any other
file.  Due to this, we don't really need a separate readahead state
(struct file_ra_state) just for the Merkle tree, but rather we just need
to piggy-back on the existing data readahead requests.

We also only really need to bother with the first level of the Merkle
tree, since the usual fan-out factor is 128, so normally over 99% of
Merkle tree I/O requests are for the first level.

Therefore, make fsverity_verify_bio() enable readahead of the first
Merkle tree level, for up to 1/4 the number of pages in the bio, when it
sees that the REQ_RAHEAD flag is set on the bio.  The readahead size is
then passed down to ->read_merkle_tree_page() for the filesystem to
(optionally) implement if it sees that the requested page is uncached.

While we're at it, also make build_merkle_tree_level() set the Merkle
tree readahead size, since it's easy to do there.

However, for now don't set the readahead size in fsverity_verify_page(),
since currently it's only used to verify holes on ext4 and f2fs, and it
would need parameters added to know how much to read ahead.

This patch significantly improves fs-verity sequential read performance.
Some quick benchmarks with 'cat'-ing a 250MB file after dropping caches:

    On an ARM64 phone (using sha256-ce):
        Before: 217 MB/s
        After: 263 MB/s
        (compare to sha256sum of non-verity file: 357 MB/s)

    In an x86_64 VM (using sha256-avx2):
        Before: 173 MB/s
        After: 215 MB/s
        (compare to sha256sum of non-verity file: 223 MB/s)

Link: https://lore.kernel.org/r/20200106205533.137005-1-ebiggers@kernel.org
Reviewed-by: Theodore Ts'o <tytso@mit.edu>
Signed-off-by: Eric Biggers <ebiggers@google.com>
2020-01-14 13:27:32 -08:00
..
acl.c
acl.h
balloc.c
bitmap.c
block_validity.c ext4: use RCU API in debug_print_tree 2019-12-15 21:41:04 -05:00
dir.c ext4: optimize __ext4_check_dir_entry() 2019-12-14 17:23:14 -05:00
ext4_extents.h
ext4_jbd2.c
ext4_jbd2.h
ext4.h This merge window saw the the following new featuers added to ext4: 2019-11-30 10:53:02 -08:00
extents_status.c
extents_status.h
extents.c
file.c
fsmap.c
fsmap.h
fsync.c
hash.c
ialloc.c ext4: reserve revoke credits in __ext4_new_inode 2019-12-14 17:47:13 -05:00
indirect.c
inline.c
inode-test.c fs/ext4/inode-test: Fix inode test on 32 bit platforms. 2019-12-09 11:15:44 -07:00
inode.c Ext4 bug fixes (including a regression fix) for 5.5 2019-12-22 10:41:48 -08:00
ioctl.c
Kconfig
Makefile
mballoc.c
mballoc.h
migrate.c
mmp.c
move_extent.c
namei.c ext4: fix unused-but-set-variable warning in ext4_add_entry() 2019-12-21 21:00:53 -05:00
page-io.c ext4: bio_alloc with __GFP_DIRECT_RECLAIM never fails 2019-11-14 22:19:11 -05:00
readpage.c ext4: bio_alloc with __GFP_DIRECT_RECLAIM never fails 2019-11-14 22:19:11 -05:00
resize.c
super.c Ext4 bug fixes (including a regression fix) for 5.5 2019-12-22 10:41:48 -08:00
symlink.c
sysfs.c
truncate.h
verity.c fs-verity: implement readahead of Merkle tree pages 2020-01-14 13:27:32 -08:00
xattr_security.c
xattr_trusted.c
xattr_user.c
xattr.c
xattr.h