Suvfs: a Virtual File System in Userspace That Supports Large Files

Total Page:16

File Type:pdf, Size:1020Kb

Suvfs: a Virtual File System in Userspace That Supports Large Files 2013 IEEE International Conference on Big Data suvfs: A virtual file system in userspace that supports large files Wasim Ahmad Bhat S.M.K. Quadri Department of Computer Sciences Department of Computer Sciences University of Kashmir University of Kashmir Email: [email protected] Email: [email protected] Abstract—As a consequence of voluminous growth and prolif- space is wasted, and 4) still there is an upper limit. eration of digital data, the file system size and count limitations In this paper, we propose a novel approach to overcome have become problematic. The fact is that file systems use fixed the file size limitation of file systems without instrumenting length fields within their metadata structures to keep track of the file system by using the concept of virtual-unification volume size, file size and file count, and hence need design (and to present a large virtual file that spans over a number of source) modification to cope up with this growth. In this paper, legitimate sized physical files. The proposal, namely suvfs, is we propose a Scalable User-space Virtual File System, namely suvfs, which when mounted on top of any file system extends its implemented as a virtual file system using FUSE framework capability to store and process large files not natively supported [1] and can be layered on top of any file system in user-space by the file system. It works by exploiting the concept of virtual to extend its capability to support large files. Furthermore, unification to present a large virtual file that spans over a number we empirically evaluated the performance overhead added of legitimate sized physical files. It does so without modifying by the suvfs algorithms by layering it on top of FAT32 file user applications, system libraries, system calls and even file system. After exercising the file system with Sprite LFS large- systems. We implemented it using FUSE framework & evaluated file micro benchmark, the results indicate that the average it for performance overhead added by layering it over FAT32 growth of performance overhead added by suvfs algorithms file system. The results indicate that there is a very minimal with doubling the file size is 0.51% for reading, 6.73% for performance hit encountered by FAT32 with suvfs mounted on writing and 9.54% for deletion. top for sequential reading, while as for sequential writing & deletion the performance hit increases with file size but is largely due to FUSE framework & not by suvfs. II. BACKGROUND &RELATED WORK Virtual Unification provides a merged view of several I. INTRODUCTION directories, without physically merging them. This allows the files to remain physically separate, but appear as if they reside File System Scalability is defined as the ability of a file in one location. As such, Virtual Unification presents a large system to support large volumes, large files, large directories directory wherein there is no limit on the number of files and and large number of files while still providing I/O performance. directories it contains. Conversely, Virtual Unification presents Thus, scalability is a two part term: Scalable to Capacity a file system that is scalable to store and process large number and Scalable to Performance. To what extent a file system of files and directories even though they may actually reside at is scalable to capacity, depends on how it stores information different locations within the file system or may even belong to about files, directories and the file system itself. As an ex- different file systems. Furthermore, as it can merge directories ample, if the file size is stored as 32-bit integer, then no file from different file systems into one, the file system so created on that file system can exceed 232 bytes (4 GB). The fact is is scalable to large volume size if the specified directories that file systems use fixed length fields within their on-disk are mount points of different file systems. Many proposals for metadata structures to keep track of volume size, file size, file virtual-unification of directories (simple or mount-points) have count, and so on. Thus being fixed in length, they are not surfaced from time to time; however the following text briefly scalable and hence limit the file system. An obvious solution discusses the most influential and popular designs. to this problem would be the usage of dynamic length fields. Plan-9 developed by Bell Labs can connect different ma- In fact, the limitation on filename length in ext2 file system chines, file servers, and networks, and offers a binding ser- was mitigated by replacing the fixed length filename field with vice that enables multiple directories to be grouped under a a dynamic one. However, in general there are three problems common namespace [2]. Similarly, 3DFS, also developed by associated with this approach; 1) it hinders the performance as AT&T Bell Labs for source code management, maintains a per- extra computations are to be performed, 2) an extra metadata process table that contains directories and a location in the file structure is added which demands space and management, and system that the directories overlay [3]. This technique is called 3) because very little space is allocated to metadata structures, viewpathing, and it presents a view of directories stacked over they can’t grow dynamically after certain limit. one another. Although, the Translucent File System Another possible solution would be to keep a large fixed length (TFS) released in SunOS 4.1 [4] also provides a viewpathing field whose length would never be possibly defeated. This idea solution like 3DFS, but is an improved one as it better has four limitations; 1) the memory requirements are high, 2) adheres to UNIX semantics when deleting a file. Moreover, a lot of space is occupied by metadata structures, 3) a lot of Union-Mounts, which were implemented on 4.4BSD-Lite, 978-1-4799-1293-3/13/$31.00 ©2013 IEEE 7 merge directories and their trees to provide a unified view [5]. for processing. The operations performed on this large virtual This structure, called the union-stack, permits directories to file are reflected in the associated fragments. Third, to avoid be dynamically added either to the top or the bottom of the individual access to the fragments and to exclude them from view. Unionfs proposed by Wright et al. [6] is the most directory listing, suvfs filters fragments from simple files using improved union file system as it maintains UNIX semantics the magic string in their filenames. while offering advanced unification features such as dynamic Furthermore, to ensure that the split and unification is trans- insertion and removal of namespaces at any point in the parent to user applications, suvfs uses file system layering to unified view. Unionfs allows users to specify a series of perform transparent splitting and unification, thus avoiding any directories and a mount point which presents the union of design or source modification of user applications, libraries, specified directories. Although, originally intended for name- system calls, file systems, etc. Layering allows trapping, pre- space unification, union file systems can also be used for processing and post-processing of file system syscalls targeted snapshotting, by marking some data sources read-only and to the below mounted file system. As such, layering is trans- then utilizing copy-on-write for the read-only sources [7]. parent to both; user applications on one side and native file Finally, mhddfs is another union file system developed by systems on other side. This mitigates the design goals of suvfs D.E. Oboukhov that allows to unite several mount points to enumerated above at 2 and 3. the single one [8]. mhddfs simulates one big file system suvfs is implemented as a file system layer in user-space using by combining several hard drives or network file systems. As FUSE framework [1]. This design decision mitigates design such, mhddfs can be argued as to be a file system scalable to goal enumerated above at 4. Figure 1 shows the design of large volume size and file count in the same way as other union suvfs using FUSE framework. file systems can be. However, mhddfs goes a step further by supporting load balancing. In mhddfs, if an overflow File System Operations suvfs arises while writing to some unified mount point, the file content already written will be transferred to another unified mount point containing enough of free space for the file. The transferring is processed on-the-fly, fully transparent for the application that is writing. large virtual file associated fragments It is worth mentioning here that no proposal (based on concept User-Mode of virtual unification) that directly claims to have overcome any size or count limitation of the file systems exists. Never- VFS theless, this paper proposes the one. FUSE File System III. DESIGN OF suvfs Kernel-Mode suvfs is a scalable user-space virtual file system that breaks the maximum file size limitation of any file system when Fig. 1. Design of suvfs using FUSE framework mounted on top of it. suvfs can extend capability of any file system to handle large file sizes without modifying the design and source of the file system. Also, with suvfs on top, there is IV. IMPLEMENTATION OF suvfs logically no upper limit on the file size. Therefore, the design suvfs is implemented using FUSE framework [1]. FUSE goals of suvfs are as follows: is an acronym for Filesystem in UserSpacE and is used to 1) To extend the capability of a file system to handle develop full-fledged file systems and to extend existing ones. large files with logically no upper limit on the file The file systems so created run in the user space.
Recommended publications
  • High Velocity Kernel File Systems with Bento
    High Velocity Kernel File Systems with Bento Samantha Miller, Kaiyuan Zhang, Mengqi Chen, and Ryan Jennings, University of Washington; Ang Chen, Rice University; Danyang Zhuo, Duke University; Thomas Anderson, University of Washington https://www.usenix.org/conference/fast21/presentation/miller This paper is included in the Proceedings of the 19th USENIX Conference on File and Storage Technologies. February 23–25, 2021 978-1-939133-20-5 Open access to the Proceedings of the 19th USENIX Conference on File and Storage Technologies is sponsored by USENIX. High Velocity Kernel File Systems with Bento Samantha Miller Kaiyuan Zhang Mengqi Chen Ryan Jennings Ang Chen‡ Danyang Zhuo† Thomas Anderson University of Washington †Duke University ‡Rice University Abstract kernel-level debuggers and kernel testing frameworks makes this worse. The restricted and different kernel programming High development velocity is critical for modern systems. environment also limits the number of trained developers. This is especially true for Linux file systems which are seeing Finally, upgrading a kernel module requires either rebooting increased pressure from new storage devices and new demands the machine or restarting the relevant module, either way on storage systems. However, high velocity Linux kernel rendering the machine unavailable during the upgrade. In the development is challenging due to the ease of introducing cloud setting, this forces kernel upgrades to be batched to meet bugs, the difficulty of testing and debugging, and the lack of cloud-level availability goals. support for redeployment without service disruption. Existing Slow development cycles are a particular problem for file approaches to high-velocity development of file systems for systems.
    [Show full text]
  • Comparison of Kernel and User Space File Systems
    Comparison of kernel and user space file systems — Bachelor Thesis — Arbeitsbereich Wissenschaftliches Rechnen Fachbereich Informatik Fakultät für Mathematik, Informatik und Naturwissenschaften Universität Hamburg Vorgelegt von: Kira Isabel Duwe E-Mail-Adresse: [email protected] Matrikelnummer: 6225091 Studiengang: Informatik Erstgutachter: Professor Dr. Thomas Ludwig Zweitgutachter: Professor Dr. Norbert Ritter Betreuer: Michael Kuhn Hamburg, den 28. August 2014 Abstract A file system is part of the operating system and defines an interface between OS and the computer’s storage devices. It is used to control how the computer names, stores and basically organises the files and directories. Due to many different requirements, such as efficient usage of the storage, a grand variety of approaches arose. The most important ones are running in the kernel as this has been the only way for a long time. In 1994, developers came up with an idea which would allow mounting a file system in the user space. The FUSE (Filesystem in Userspace) project was started in 2004 and implemented in the Linux kernel by 2005. This provides the opportunity for a user to write an own file system without editing the kernel code and therefore avoid licence problems. Additionally, FUSE offers a stable library interface. It is originally implemented as a loadable kernel module. Due to its design, all operations have to pass through the kernel multiple times. The additional data transfer and the context switches are causing some overhead which will be analysed in this thesis. So, there will be a basic overview about on how exactly a file system operation takes place and which mount options for a FUSE-based system result in a better performance.
    [Show full text]
  • Software Defined Storage Overview
    Software Defined Storage Overview August 2019 Juan Jose Floristan Cloud Specialist Solution Architect 1 AGENDA 1. Why Red Hat Storage? 2. Red Hat Ceph Storage 3. Red Hat Gluster Storage 4. Red Hat Openshift Container Storage 2 Why Red Hat Storage? 3 Why Red Hat Storage? STORAGE IS EVOLVING TRADITIONAL STORAGE OPEN, SOFTWARE-DEFINED STORAGE Complex proprietary silos Standardized, unified, open platforms USER USER USER USER ADMIN Control Plane (API, GUI) ADMIN ADMIN ADMIN Software Ceph Gluster +++ Open Source Custom GUI Custom GUI Custom GUI Proprietary Hardware Proprietary Hardware Proprietary Hardware Standard Computers and Disks Proprietary Proprietary Proprietary Standard Hardware Software Software Software 4 Why Red Hat Storage? WHY THIS MATTERS PROPRIETARY Common, Lower cost, standardized supply chain HARDWARE off-the-shelf hardware SCALE-UP Scale-out Increased operational flexibility ARCHITECTURE architecture HARDWARE-BASED Software-based More programmability, agility, INTELLIGENCE intelligence and control CLOSED DEVELOPMENT Open development More flexible, well-integrated PROCESS process technology 5 Why Red Hat Storage? A RISING TIDE Software-Defined Storage is leading SDS-P MARKET SIZE BY SEGMENT $1,395M a shift in the global storage industry, Block Storage File Storage $1,195M with far-reaching effects. Object Storage $1,029M Hyperconverged “By 2020, between 70%-80% of unstructured $859M data will be held on lower-cost storage managed $705M $592M by SDS.” $475M Innovation Insight: Separating Hype From Hope for Software-Defined Storage “By 2019, 70% of existing storage array products will also be available as software-only versions.” 2013 2014 2015 2016 2017 2018 Innovation Insight: Separating Hype From Hope for Software-Defined Storage 2019 Source: IDC 6 Why Red Hat Storage? THE RED HAT STORAGE MISSION To offer a unified, open software-defined storage portfolio that delivers a range of data services for next generation workloads, thereby accelerating the transition to modern IT infrastructures.
    [Show full text]
  • Lamassu: Storage-Efficient Host-Side Encryption
    Lamassu: Storage-Efficient Host-Side Encryption Peter Shah and Won So NetApp Inc. Abstract moves downstream through the stack. This strategy can Many storage customers are adopting encryption solu- take many forms, such as built-in application encryption, tions to protect critical data. Most existing encryption OS-based file system encryption or VM-level encryp- solutions sit in, or near, the application that is the source tion [3, 19, 22]. We term any encryption that runs on of critical data, upstream of the primary storage system. the same physical hardware as the primary application Placing encryption near the source ensures that data re- data-source encryption. mains encrypted throughout the storage stack, making it In general, existing data-source encryption solutions easier to use untrusted storage, such as public clouds. interfere with content-driven data management features Unfortunately, such a strategy also prevents down- provided by storage systems — in particular, deduplica- stream storage systems from applying content-based fea- tion. If a storage controller does not have access to the tures, such as deduplication, to the data. In this paper, we keys used to secure data, it cannot compare the contents present Lamassu, an encryption solution that uses block- of encrypted data to determine which sections, if any, are oriented, host-based, convergent encryption to secure duplicates. data, while preserving storage-based data deduplication. In this paper, we present an alternative encryption Unlike past convergent encryption systems, which typi- strategy that provides the benefits of upstream encryp- cally store encryption metadata in a dedicated store, our tion while preserving storage-based data deduplication system transparently inserts its metadata into each file’s on downstream storage.
    [Show full text]
  • D3.5 Design and Implementation of P2P Infrastructure
    INNOVATION ACTION H2020 GRANT AGREEMENT NUMBER: 825171 WP3 – Vision Materialisation and Technical Infrastructure D3.5 – Design and implementation of P2P infrastructure Document Info Contractual Delivery Date: 31/12/2019 Actual Delivery Date: 31/12/2019 Responsible Beneficiary: INOV Contributing Beneficiaries: UoG Dissemination Level: Public Version: 1.0 Type: Final This project has received funding from the European Union’s H2020 research and innovation programme under the grant agreement No 825171 ` DOCUMENT INFORMATION Document ID: D3.5: Design and implementation of P2P infrastructure Version Date: 31/12/2019 Total Number of Pages: 36 Abstract: This deliverable describes the EUNOMIA P2P infrastructure, its design, the EUNOMIA P2P APIs and a first implementation of the P2P infrastructure and the corresponding APIs made available for the remaining EUNOMIA modules to start integration (for the 1st phase). Keywords: P2P design, P2P infrastructure, IPFS AUTHORS Full Name Beneficiary / Organisation Role INOV INESC INOVAÇÃO INOV Overall Editor University of Greenwich UoG Contributor REVIEWERS Full Name Beneficiary / Organisation Date University of Nicosia UNIC 23/12/2019 VERSION HISTORY Version Date Comments 0.1 13/12/2019 First internal draft 0.6 22/12/2019 Complete draft for review 0.8 29/12/2019 Final draft following review 1.0 31/12/2019 Final version to be released to the EC Type of deliverable PUBLIC Page | ii H2020 Grant Agreement Number: 825171 Document ID: WP3 / D3.5 EXECUTIVE SUMMARY This deliverable describes the P2P infrastructure that has been implemented during the first phase of the EUNOMIA to provide decentralized support for storage, communication and security functions. It starts with a review of the main existing P2P technologies, where each one is analysed and a selection of candidates are selected to be used in the project.
    [Show full text]
  • Encrypted File System Based on Distributed Key-Value Stores and FUSE
    International Journal of Network Security & Its Applications (IJNSA) Vol.11, No.2, March 2019 KVEFS: Encrypted File System based on Distributed Key-Value Stores and FUSE Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, Thanh Nguyen Kim, Nguyen Van Cuong, Thanh Nguyen Trung, and Ta Minh Thanh Le Quy Don Technical University No 236 Hoang Quoc Viet Street , Hanoi, Vietnam [email protected] Abstract. File System is an important component of a secure operating system. The need to build data protection systems is extremely important in open source operating systems, high mobility hardware systems, and miniaturization of storage devices that make systems available. It is clear that the value of the data is much larger than the value of the storage device. Computers access protection mechanism does not work if the thief retrieves the hard drive from the computer and reads data from it on another computer. Encrypted File System (EFS) is a secure level of operating system kernel. EFS uses cryptography to encrypt or decrypt files and folders when they are being saved or retrieved from a hard disk. EFS is often integrated transparently in operating system There are many encrypted filesystems commonly used in Linux operating systems. However, they have some limitations, which are the inability to hide the structure of the file system. This is a shortcoming targeted by the attacker, who will try to decrypt a file to find the key and then decrypt the entire file system. In this paper, we propose a new architecture of EFS called KVEFS which is based on cryptographic algorithms, FUSE library and key-value store.
    [Show full text]
  • The Evolution of File Systems
    The Evolution of File Systems Thomas Rivera, Hitachi Data Systems Craig Harmer, April 2011 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the Author nor the Presenter is an attorney and nothing in this presentation is intended to be nor should be construed as legal advice or opinion. If you need legal advice or legal opinion please contact an attorney. The information presented herein represents the Author's personal opinion and current understanding of the issues involved. The Author, the Presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. The Evolution of File Systems 2 © 2012 Storage Networking Industry Association. All Rights Reserved. 2 Abstract The File Systems Evolution Over time additional file systems appeared focusing on specialized requirements such as: data sharing, remote file access, distributed file access, parallel files access, HPC, archiving, security, etc. Due to the dramatic growth of unstructured data, files as the basic units for data containers are morphing into file objects, providing more semantics and feature- rich capabilities for content processing This presentation will: Categorize and explain the basic principles of currently available file system architectures (e.g.
    [Show full text]
  • Refuse: Userspace FUSE Reimplementation Using Puffs
    ReFUSE: Userspace FUSE Reimplementation Using puffs Antti Kantee Alistair Crooks Helsinki University of Technology The NetBSD Foundation [email protected].fi [email protected] Abstract for using Gmail as a file system storage backend and FUSEPod [5] which facilitaties iPod access and man- In an increasingly diverse and splintered world, agement. interoperability rules. The ability to leverage code Userspace file systems operate by attaching an in- written for another platform means more time and re- kernel file system to the kernel’s virtual file system sources for doing new and exciting research instead layer, vfs [17]. This component transforms incoming of reinventing the wheel. Interoperability requires requests into a form suitable for delivery to userspace, standards, and as the saying goes, the best part of sends the request to userspace, waits for a response, standards is that everyone can have their own. How- interprets the result and feeds it back to caller in the ever, in the userspace file system world, the Linux- kernel. The kernel file system calling conventions originated FUSE is the clear yardstick. dictate how to interface with the virtual file system In this paper we present ReFUSE, a userspace layer, but other than that the userspace file systems implementation of the FUSE interface on top of the framework is free to decide how to operate and what NetBSD native puffs (Pass-to-Userspace Framework kind of interface to provide to userspace. File System) userspace file systems framework. We While extending the operating system to userspace argue that an additional layer of indirection is the is not a new idea [12, 21], the FUSE [2] userspace right solution here, as it allows for a more natural file systems interface is the first to become a veri- export of the kernel file system interface instead of table standard.
    [Show full text]
  • How High School Students Can Write a Filesystem Prototype
    ALMA MATER STUDIORUM · UNIVERSITÀ DI BOLOGNA Scuola di Scienze Corso di Laurea in Informatica TgFuseFs: How High School Students Can Write a Filesystem Prototype Tesi di laurea Relatore: Presentata da: Chiar.mo Prof. Riccardo Maffei Renzo Davoli Correlatori: Dott. Marco Sbaraglia Dott. Michael Lodi Sessione III Anno Accademico 2018-2019 Information about licenses and credits can be found in AppendixA. ii To those I love and those who love me... iii iv Abstract Italian high school students who are majoring in Computer Science usually study subjects like programming, databases, networks, system engineering, electronics and operating systems. While most of these subjects let the stu- dents practice with projects, operating systems usually is taught in a more the- oretical way because practical projects either are too simple to be didactically useful or require too many prerequisites. Hence, components like filesystems are only studied in theory from an high level point of view. We think that building a filesystem prototype could be considered active learn- ing and could improve the operating systems learning experience. For this reason in this work we will show how fifth year students with very few pre- requisites can build their first working prototype of a remote filesystem in userspace using Python, FUSE and Telegram. Since the activity is designed for high school students, the prototype won’t be perfect but we will present some of the issues that students should be aware of and more advanced students should address. v vi Contents Introduction1 1 General Concepts3 1.1 Requirements...............................3 1.2 Python...................................4 1.2.1 asyncio ..............................4 1.3 FUSE and libfuse ............................8 1.3.1 pyfuse3 .............................
    [Show full text]
  • Linux Kernel Series
    Linux Kernel Series By Devyn Collier Johnson More Linux Related Stuff on: http://www.linux.org Linux Kernel – The Series by Devyn Collier Johnson (DevynCJohnson) [email protected] Introduction In 1991, a Finnish student named Linus Benedict Torvalds made the kernel of a now popular operating system. He released Linux version 0.01 on September 1991, and on February 1992, he licensed the kernel under the GPL license. The GNU General Public License (GPL) allows people to use, own, modify, and distribute the source code legally and free of charge. This permits the kernel to become very popular because anyone may download it for free. Now that anyone can make their own kernel, it may be helpful to know how to obtain, edit, configure, compile, and install the Linux kernel. A kernel is the core of an operating system. The operating system is all of the programs that manages the hardware and allows users to run applications on a computer. The kernel controls the hardware and applications. Applications do not communicate with the hardware directly, instead they go to the kernel. In summary, software runs on the kernel and the kernel operates the hardware. Without a kernel, a computer is a useless object. There are many reasons for a user to want to make their own kernel. Many users may want to make a kernel that only contains the code needed to run on their system. For instance, my kernel contains drivers for FireWire devices, but my computer lacks these ports. When the system boots up, time and RAM space is wasted on drivers for devices that my system does not have installed.
    [Show full text]
  • FUSE? Implementierung Anwendungen
    Was ist FUSE? Implementierung Anwendungen FUSE Filesystem in Userspace Michael Burian Bernhard Guillon Stefan Huber Institut für Computerwissenschaften Universität Salzburg Wissenschaftliche Arbeitstechniken und Präsentation Michael Burian, Bernhard Guillon und Stefan Huber Was ist FUSE? Implementierung Anwendungen Gliederung 1 Was ist FUSE? Allgemein Wh. Betriebssysteme und FUSE-Ansatz Motivation 2 Implementierung concatfs Source Code 3 Anwendungen Überblick Beispiele ntfs-3g, sshfs, gmailfs, clamfs Kurioses Michael Burian, Bernhard Guillon und Stefan Huber Was ist FUSE? Allgemein Implementierung Wh. Betriebssysteme und FUSE-Ansatz Anwendungen Motivation Gliederung 1 Was ist FUSE? Allgemein Wh. Betriebssysteme und FUSE-Ansatz Motivation 2 Implementierung concatfs Source Code 3 Anwendungen Überblick Beispiele ntfs-3g, sshfs, gmailfs, clamfs Kurioses Michael Burian, Bernhard Guillon und Stefan Huber Was ist FUSE? Allgemein Implementierung Wh. Betriebssysteme und FUSE-Ansatz Anwendungen Motivation FUSE stellt sich vor FUSE ist ein Userspace Dateisystem Framework FUSE besteht aus Kernel Modul (fuse.ko) Userspace Library (libfuse.*) Userspace mount (fusermount) FUSE öffnet neue Möglichkeiten für Dateisysteme Michael Burian, Bernhard Guillon und Stefan Huber Was ist FUSE? Allgemein Implementierung Wh. Betriebssysteme und FUSE-Ansatz Anwendungen Motivation Monolithischer- vs. Micro-Kernel Monolithic Kernel Microkernel Application System Call user mode VFS IPC, File System Application UNIX Device File IPC Server Driver Server Scheduler, Virtual Memory kernel mode Device Drivers, Dispatcher, ... Basic IPC, Virtual Memory, Scheduling Hardware Hardware Michael Burian, Bernhard Guillon und Stefan Huber Was ist FUSE? Allgemein Implementierung Wh. Betriebssysteme und FUSE-Ansatz Anwendungen Motivation Kernelmode Dateisystem Treiber ls -l /etc/fstab glibc Userspace Kernel FUSE NFS VFS Ext3 ... Michael Burian, Bernhard Guillon und Stefan Huber Was ist FUSE? Allgemein Implementierung Wh.
    [Show full text]
  • Efficient Data Retrieval from a Secure, Durable, Append-Only
    Efficient Data Retrieval from a Secure, Durable, Append-Only Log ∗ Sam Kumar, Andrew M. Chen, Paul R. Bramsen, John D. Kubiatowicz {samkumar, andrewmchen, paulbramsen, kubitron}@berkeley.edu Electrical Engineering and Computer Sciences, UC Berkeley ABSTRACT viously much more well-suited to storing their data than The Global Data Plane (GDP) [1] provides a secure, verifi- a traditional DBMS, for the simple reason that a DBMS able, append-only, single-writer log interface where logs are must support much richer data semantics than are needed replicated across a range of possibly untrusted hosts. A ma- for this task. Beyond being more efficient, the GDP enables jor advantage of such a log interface is that it is possible to a new paradigm for building complex distributed data sys- provide atomicity and consistent replication with little over- tems; rather than first building the system and then adding head, while scaling at a global level. However, expressing locking or logging schemes to achieve the desired consistency mutable objects in append-only logs, while simultaneously and durability properties, one may choose to build a system providing efficient access to data within those objects, is a on top of GDP, which can cheaply achieve these properties, nontrivial task. In this paper, we present the Global Data in such a way that some of these properties shine through Plane File System (GDPFS), a distributed filesystem that in the final system. expresses mutable files within append-only logs and provides efficient data access within files. Because it is built on top The main difficulty in this approach is one of the advantages of the GDP, the GDPFS has the potential to scale very well mentioned earlier: the append-only nature of logs in the and run securely on untrusted hardware.
    [Show full text]