TFS: a Transparent File System for Contributory Storage

Total Page:16

File Type:pdf, Size:1020Kb

TFS: a Transparent File System for Contributory Storage TFS: A Transparent File System for Contributory Storage James Cipar Mark D. Corner Emery D. Berger Department of Computer Science University of Massachusetts Amherst Amherst, MA 01003 {jcipar, mcorner, emery}@cs.umass.edu Abstract cations in wide use include computing efforts like Fold- ing@home [17] and anonymous publishing and content Contributory applications allow users to donate unused distribution such as Freenet [8]. The research commu- resources on their personal computers to a shared pool. nity has also developed a number of contributory appli- Applications such as SETI@home, Folding@home, and cations, including distributed backup and archival stor- Freenet are now in wide use and provide a variety of ser- age [30], server-less network file systems [1], and dis- vices, including data processing and content distribution. tributed web caching [11]. However, the adoption of However, while several research projects have proposed storage-based contributory applications has been limited contributory applications that support peer-to-peer stor- compared to those that are CPU-based. age systems, their adoption has been comparatively lim- Two major barriers impede broader participation in ited. We believe that a key barrier to the adoption of contributory storage systems. First, existing contribu- contributory storage systems is that contributing a large tory storage systems degrade normal application perfor- quantity of local storage interferes with the principal user mance. While transparency—the effect that system per- of the machine. formance is as if no contributory application is running— To overcome this barrier, we introduce the Transparent has been the goal of other OS mechanisms for network File System (TFS). TFS provides background tasks with bandwidth [34], main memory [7], and disk schedul- large amounts of unreliable storage—all of the currently ing [19], previous work on contributory storage systems available space—without impacting the performance of has ignored its local performance impact. In particu- ordinary file access operations. We show that TFS al- lar, as more storage is allocated, the performance of the lows a peer-to-peer contributory storage system to pro- user’s file system operations quickly degrades [20]. vide 40% more storage at twice the performance when Second, despite the fact that end-user hard drives are compared to a user-space storage mechanism. We an- often half empty [10, 16], users are generally reluctant alyze the impact of TFS on replication in peer-to-peer to relinquish their free space. Though disk capacity has storage systems and show that TFS does not appreciably been steadily increasing for many years, users view stor- increase the resources needed for file replication. age space as a limited resource. For example, three of the Freenet FAQs express the implicit desire to donate less 1 Introduction disk space [12]. Even when users are given the choice to limit the amount of storage contribution, this option Contributory applications allow users to donate unused requires the user to decide a priori what is a reasonable resources from their personal computers to a shared pool. contribution. Users may also try to donate as little as pos- These applications harvest idle resources such as CPU sible while still taking advantage of the services provided cycles, memory, network bandwidth, and local storage to by the contributory application, thus limiting its overall serve a common distributed system. These applications effectiveness. are distinct from other peer-to-peer systems because the Contributions: This paper presents the Transparent resources being contributed are not directly consumed File System (TFS), a file system that can contribute by the contributor. For instance, in Freenet [8], all 100% of the idle space on a disk while imposing a neg- users contribute storage, and any user may make use ligible performance penalty on the local user. TFS oper- of the storage, but there is no relationship between ates by storing files in the free space of the file system user data and contributed storage. Contributory appli- so that they are invisible to ordinary files. In essence, normal file allocation proceeds as if the system were not Instead of using static limits, one could use a dynamic contributing any space at all. We show in Section 5 that system that monitors the amount of storage used by lo- TFS imposes nearly no overhead on the local user. TFS cal applications. The contributory storage system could achieves this both by minimizing interference with the then use a significantly greater portion of the disk, while file system’s block allocation policy and by sacrificing yielding space to the local user as needed. Possible persistence for contributed space: normal files may over- approaches include the watermarking schemes found in write contributed space at any time. TFS takes several Elastic Quotas [18] and FS2 [16]. A contributory storage steps that limit this unreliability, but because contribu- system could use these approaches as follows: whenever tory applications are already designed to work with un- the current allocation exceeds the maximum watermark reliable machines, they behave appropriately in the face set by the dynamic contribution system, it could delete of unreliable files. Furthermore, we show that TFS does contributory files until the contribution level falls below not appreciably impact the bandwidth needed for repli- a lower watermark. cation. Users typically create little data in the course of However, if the watermarks are set to comprise all a day [4], thus the erasure of contributed storage is neg- free space on the disk, the file system is forced to delete ligible when compared to the rate of machine failures. files synchronously from contributed storage when writ- TFS is especially useful for replicated storage systems ing new files to disk. In this case, the performance of the executing across relatively stable machines with plentiful disk would be severely degraded, similar to the synchro- bandwidth, as in a university or corporate network. This nous cleaning problem in LFS [31]. For this reason, Elas- environment is the same one targeted by distributed stor- tic Quotas and FS2 use more conservative watermarks age systems such as FARSITE [1]. As others have shown (e.g., at most 85%), allowing the system to delete files previously, for high-failure modes, such as wide-area lazily as needed. Internet-based systems, the key limitation is the band- Choosing a proper watermark leaves the system de- width between nodes, not the total storage. The band- signer with a trade-off between the amount of storage width needed to replicate data after failures essentially contributed and local performance. At one end of the limits the amount of storage the network can use [3]. spectrum, the system can contribute little space, limiting In a stable network, TFS offers substantially more stor- its usefulness. At the other end of the spectrum, local age than dynamic, user-space techniques for contributing performance suffers. storage. To see why local performance suffers, consider the fol- Organization: In Section 2, we first provide a de- lowing: as a disk fills, the file system’s block allocation tailed explanation of the interference caused by contrib- algorithm becomes unable to make ideal allocation de- utory applications, and discuss current alternatives for cisions, causing fragmentation of the free space and al- contributing storage. Second, we present the design of located files. This fragmentation increases the seek time TFS in Section 3, focusing on providing transparency to when reading and writing files, and has a noticeable ef- normal file access. We describe a fully operating imple- fect on the performance of disk-bound processes. In an mentation of TFS. We then explain in Section 4 the in- FFS file system, throughput can drop by as much as 77% teraction between machine reliability, contributed space, in a file system that is only 75% full versus an empty and the amount of storage used by a contributory stor- file system [32]—the more storage one contributes, the age system. Finally, we demonstrate in Section 5 that the worse the problem becomes. The only way to avoid this performance of our TFS prototype is on par with the file is to maintain enough free space on the disk to allow the system it was derived from, and up to twice as fast as allocation algorithm to work properly, but this limits con- user-space techniques for contributing storage. tribution to only a small portion of the disk. Though some file systems provide utilities to defrag- 2 Interference from Contributing Storage ment their disk layout, these utilities are ineffective when there is insufficient free space on the file system. For in- All contributory applications we are aware of are config- stance, the defragmentation utility provided with older ured to contribute a small, fixed amount of storage—the versions of Microsoft Windows will not even attempt to contribution is small so as not to interfere with normal defragment a disk if more than 85% is in use. On mod- machine use. This low level of contribution has little im- ern Windows systems, the defragmentation utility will pact on file system performance and files will generally run when the disk is more than 85% full, but will give only be deleted by the contributory system, not because a warning that there is not enough free space to defrag- the user needs storage space. However, such small, fixed- ment properly [22]. When one wants to contribute all of size contributions limit contribution to small-scale stor- the free space on the disk, they will be unable to meet age systems. these requirements of the defragmentation utility. 60 tuning it. Accordingly, deviating from that policy can re- sult in a loss of performance. The presence of data on the 50 file system can be viewed as an obstruction which causes 40 a deviation from the default allocation policy.
Recommended publications
  • Copy on Write Based File Systems Performance Analysis and Implementation
    Copy On Write Based File Systems Performance Analysis And Implementation Sakis Kasampalis Kongens Lyngby 2010 IMM-MSC-2010-63 Technical University of Denmark Department Of Informatics Building 321, DK-2800 Kongens Lyngby, Denmark Phone +45 45253351, Fax +45 45882673 [email protected] www.imm.dtu.dk Abstract In this work I am focusing on Copy On Write based file systems. Copy On Write is used on modern file systems for providing (1) metadata and data consistency using transactional semantics, (2) cheap and instant backups using snapshots and clones. This thesis is divided into two main parts. The first part focuses on the design and performance of Copy On Write based file systems. Recent efforts aiming at creating a Copy On Write based file system are ZFS, Btrfs, ext3cow, Hammer, and LLFS. My work focuses only on ZFS and Btrfs, since they support the most advanced features. The main goals of ZFS and Btrfs are to offer a scalable, fault tolerant, and easy to administrate file system. I evaluate the performance and scalability of ZFS and Btrfs. The evaluation includes studying their design and testing their performance and scalability against a set of recommended file system benchmarks. Most computers are already based on multi-core and multiple processor architec- tures. Because of that, the need for using concurrent programming models has increased. Transactions can be very helpful for supporting concurrent program- ming models, which ensure that system updates are consistent. Unfortunately, the majority of operating systems and file systems either do not support trans- actions at all, or they simply do not expose them to the users.
    [Show full text]
  • Membrane: Operating System Support for Restartable File Systems Swaminathan Sundararaman, Sriram Subramanian, Abhishek Rajimwale, Andrea C
    Membrane: Operating System Support for Restartable File Systems Swaminathan Sundararaman, Sriram Subramanian, Abhishek Rajimwale, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift Computer Sciences Department, University of Wisconsin, Madison Abstract and most complex code bases in the kernel. Further, We introduce Membrane, a set of changes to the oper- file systems are still under active development, and new ating system to support restartable file systems. Mem- ones are introduced quite frequently. For example, Linux brane allows an operating system to tolerate a broad has many established file systems, including ext2 [34], class of file system failures and does so while remain- ext3 [35], reiserfs [27], and still there is great interest in ing transparent to running applications; upon failure, the next-generation file systems such as Linux ext4 and btrfs. file system restarts, its state is restored, and pending ap- Thus, file systems are large, complex, and under develop- plication requests are serviced as if no failure had oc- ment, the perfect storm for numerous bugs to arise. curred. Membrane provides transparent recovery through Because of the likely presence of flaws in their imple- a lightweight logging and checkpoint infrastructure, and mentation, it is critical to consider how to recover from includes novel techniques to improve performance and file system crashes as well. Unfortunately, we cannot di- correctness of its fault-anticipation and recovery machin- rectly apply previous work from the device-driver litera- ery. We tested Membrane with ext2, ext3, and VFAT. ture to improving file-system fault recovery. File systems, Through experimentation, we show that Membrane in- unlike device drivers, are extremely stateful, as they man- duces little performance overhead and can tolerate a wide age vast amounts of both in-memory and persistent data; range of file system crashes.
    [Show full text]
  • Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO
    Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO..........................................................................................................................................1 Martin Hinner < [email protected]>, http://martin.hinner.info............................................................1 1. Introduction..........................................................................................................................................1 2. Volumes...............................................................................................................................................1 3. DOS FAT 12/16/32, VFAT.................................................................................................................2 4. High Performance FileSystem (HPFS)................................................................................................2 5. New Technology FileSystem (NTFS).................................................................................................2 6. Extended filesystems (Ext, Ext2, Ext3)...............................................................................................2 7. Macintosh Hierarchical Filesystem − HFS..........................................................................................3 8. ISO 9660 − CD−ROM filesystem.......................................................................................................3 9. Other filesystems.................................................................................................................................3
    [Show full text]
  • SGI™ Propack 1.3 for Linux™ Start Here
    SGI™ ProPack 1.3 for Linux™ Start Here Document Number 007-4062-005 © 1999—2000 Silicon Graphics, Inc.— All Rights Reserved The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Silicon Graphics, Inc. LIMITED AND RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure by the Government is subject to restrictions as set forth in the Rights in Data clause at FAR 52.227-14 and/or in similar or successor clauses in the FAR, or in the DOD, DOE or NASA FAR Supplements. Unpublished rights reserved under the Copyright Laws of the United States. Contractor/ manufacturer is SGI, 1600 Amphitheatre Pkwy., Mountain View, CA 94043-1351. Silicon Graphics is a registered trademark and SGI and SGI ProPack for Linux are trademarks of Silicon Graphics, Inc. Intel is a trademark of Intel Corporation. Linux is a trademark of Linus Torvalds. NCR is a trademark of NCR Corporation. NFS is a trademark of Sun Microsystems, Inc. Oracle is a trademark of Oracle Corporation. Red Hat is a registered trademark and RPM is a trademark of Red Hat, Inc. SuSE is a trademark of SuSE Inc. TurboLinux is a trademark of TurboLinux, Inc. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. SGI™ ProPack 1.3 for Linux™ Start Here Document Number 007-4062-005 Contents List of Tables v About This Guide vii Reader Comments vii 1. Release Features 1 Feature Overview 2 Qualified Drivers 3 Patches and Changes to Base Linux Distributions 3 2.
    [Show full text]
  • State of the Art: Where We Are with the Ext3 Filesystem
    State of the Art: Where we are with the Ext3 filesystem Mingming Cao, Theodore Y. Ts’o, Badari Pulavarty, Suparna Bhattacharya IBM Linux Technology Center {cmm, theotso, pbadari}@us.ibm.com, [email protected] Andreas Dilger, Alex Tomas, Cluster Filesystem Inc. [email protected], [email protected] Abstract 1 Introduction Although the ext2 filesystem[4] was not the first filesystem used by Linux and while other filesystems have attempted to lay claim to be- ing the native Linux filesystem (for example, The ext2 and ext3 filesystems on Linux R are when Frank Xia attempted to rename xiafs to used by a very large number of users. This linuxfs), nevertheless most would consider the is due to its reputation of dependability, ro- ext2/3 filesystem as most deserving of this dis- bustness, backwards and forwards compatibil- tinction. Why is this? Why have so many sys- ity, rather than that of being the state of the tem administrations and users put their trust in art in filesystem technology. Over the last few the ext2/3 filesystem? years, however, there has been a significant amount of development effort towards making There are many possible explanations, includ- ext3 an outstanding filesystem, while retaining ing the fact that the filesystem has a large and these crucial advantages. In this paper, we dis- diverse developer community. However, in cuss those features that have been accepted in our opinion, robustness (even in the face of the mainline Linux 2.6 kernel, including direc- hardware-induced corruption) and backwards tory indexing, block reservation, and online re- compatibility are among the most important sizing.
    [Show full text]
  • Linux 2.5 Kernel Developers Summit
    conference reports This issue’s reports are on the Linux 2.5 Linux 2.5 Kernel Developers Linux development, but I certainly Kernel Developers Summit Summit thought that, in all of this time, someone would have brought this group together OUR THANKS TO THE SUMMARIZER: SAN JOSE, CALIFORNIA before. Rik Farrow, with thanks to La Monte MARCH 30-31, 2001 Yarroll and Chris Mason for sharing their Summarized by Rik Farrow Another difference appeared when the notes. first session started on Friday morning. The purpose of this workshop was to The conference room was set up with cir- provide a forum for discussion of cular tables, each with power strips for changes to be made in the 2.5 release of For additional information on the Linux laptops, and only a few attendees were Linux (a trademark of Linus Torvalds). I not using a laptop. USENIX had pro- 2.5 Kernel Developers Summit, see the assume that many people reading this vided Aeronet wireless setup via the following sites: will be familiar with Linux, and I will hotel’s T1 link, and people were busy <http://lwn.net/2001/features/KernelSummit/> attempt to explain things that might be typing and compiling. Chris Mason of unfamiliar to others. That said, the odd- <http://cgi.zdnet.com/slink?91362:12284618> OSDN noticed that Dave Miller had numbered releases, like 2.3 and now 2.5, <http://www.osdn.com/conferences/kernel/> written a utility to modulate the speed of are development releases where the the CPU fans based upon the tempera- intent is to try out new features or make ture reading from his motherboard.
    [Show full text]
  • A File System Level Snapshot in Ext4
    Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 A File System Level Snapshot In Ext4 Uma Nagaraj Computer Engineering Department, Pune University, MAE, Alandi Pune, Maharashtra 412105, India E-mail: [email protected] Ganesh Patil Computer Engineering Department, Pune University, MAE, Alandi Pune, Maharashtra 412105, India E-mail: [email protected] Swapnil Gaikwad Computer Engineering Department, Pune University, MAE, Alandi Pune, Maharashtra 412105, India E-mail: [email protected] Akshay Nehe Computer Engineering Department, Pune University, MAE, Alandi Pune, Maharashtra 412105, India E-mail: [email protected] Ashish Mayekar Computer Engineering Department, Pune University, MAE, Alandi Pune, Maharashtra 412105, India E-mail: [email protected] Received: 2011-10-20 Accepted: 2011-10-29 Published:2011-11-04 Abstract Snapshot makes a copy of current working system. Creating a snapshot with some processing and overheads is important to provide the reliable data service during backup. There are two types of snapshot techniques: volume-based approach and system-based approach. The volume-based Logical Volume Manager provides compact space usability, but requires some space to save snapshot and makes system with extra overheads. The system-based Snapshot works better than volume based. The file system based Snapshot does not need reserve space for snapshot. Therefore, the system-based Snapshot is considered a good solution in the computer environment where large-scale space management capability is not that critical. However, such snapshot feature is available in Linux kernel 2.2, 2.6 in EXT3 file system. In this paper, we proposed a system-based snapshot for the ext4 system in Linux kernel 2.6 or higher.
    [Show full text]
  • VERSIONFS a Versatile and User-Oriented Versioning File System
    VERSIONFS A Versatile and User-Oriented Versioning File System A THESIS PRESENTED BY KIRAN-KUMAR MUNISWAMY-REDDY TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE STONY BROOK UNIVERSITY Technical Report FSL-03-03 December 2003 Abstract of the Thesis Versionfs A Versatile and User-Oriented Versioning File System by Kiran-Kumar Muniswamy-Reddy Master of Science in Computer Science Stony Brook University 2003 File versioning is a useful technique for recording a history of changes. Applications of ver- sioning include backups and disaster recovery, as well as monitoring intruders’ activities. Alas, modern systems do not include an automatic and easy-to-use file versioning system. Existing backup systems are slow and inflexible for users. Even worse, they often lack backups for the most recent day’s activities. Online disk snapshotting systems offer more fine-grained versioning, but still do not record the most recent changes to files. Moreover, existing systems also do not give individual users the flexibility to control versioning policies. We designed a lightweight user-oriented versioning file system called Versionfs. Versionfs works with any file system, whether local or remote, and provides a host of user-configurable policies: versioning by users, groups, processes, or file names and extensions; version retention policies by maximum number of versions kept, age, or total space consumed by versions of a file; version storage policies using full copies, compressed copies, or deltas. Versionfs creates file versions automatically, transparently, and in a file-system portable manner—while maintaining Unix semantics. A set of user-level utilities allow administrators to configure and enforce default policies; users are able to set policies within configured boundaries, as well as view, control, and recover files and their versions.
    [Show full text]
  • The Third Extended File System with Copy-On-Write
    Limiting Liability in a Federally Compliant File System Zachary N. J. Peterson The Johns Hopkins University Hopkins Storage Systems Lab, Department of Computer Science Regulatory Requirements z Data Maintenance Acts & Regulations – HIPAA, GISRA, SOX, GLB – 4,000+ State and Federal Laws and Regulations with regards to storage z Audit Trail – creating a “chain of trust” – Files are versioned over time – Authenticated block sharing (copy-on-write) between versions. z Disk Encryption – Privacy and Confidentiality – Non-repudiation Hopkins Storage Systems Lab, Department of Computer Science Secure Deletion in a Regulatory Environment z Desire to limit liability when audited – Records that go out of audit scope do so forever – When a disk is subpoenaed old or irrelevant data are inaccessible z Existing Techniques – Secure overwrite [Gutmann] – File key disposal in disk encrypted systems [Boneh & Lipton] z Existing solutions don’t work well in block- versioning file systems Hopkins Storage Systems Lab, Department of Computer Science Technical Problems z Secure overwriting of noncontiguous data blocks is slow and inefficient – When versions share blocks, data to be overwritten may be noncontiguous z Cannot dispose file keys in a versioning file system – Blocks encrypted with a particular key need to be available in future versions z User space tools are inadequate – Can’t delete metadata – Can’t be interposed between file operations – Truncate may leak data – Difficult to be synchronous Hopkins Storage Systems Lab, Department of Computer Science
    [Show full text]
  • A Secure Context-Sensitive File System Britton Dennis, Tyler Travis
    A Secure Context-Sensitive File System determined within a split second. Computers, like humans, experience a variety of contexts Britton Dennis, Tyler Travis, Clark Wood at different times. The difference between visiting the real Facebook website and a clever Abstract imposter may be the difference between seeing HTTP and HTTPS in one’s browser. In this paper we present a secure, Until now, security context was determined in context-sensitive file system. Our system was real-time by users picking up various context designed to offer block level security as well as clues and modifying their own behavior present access to a file under multiple, accordingly. The disadvantage of this manual, constantly shifting contexts in diverse fashions. case-by-case decision is that humans make Some of our related works illustrate different mistakes. A less technologically-savvy person ways to use the different context / view may not even notice that what appears to be approach, but these prior works raise similar their banking website has an invalid SSL security concerns, and consequently we chose certificate, and because additional security to design our file system to limit the information comes at the cost of usability, users often that gets presented to the viewer. This is ignore such warnings, even if they know what because of a fundamental capacity for the warning means. The burden of determining sensitive data leakage in these systems, owing the secureness of a given system cannot be to the presence of naming collisions. This placed solely upon end-users. becomes important when trying to design a In order to mitigate these concerns, secure file system which adheres to such researchers are developing context-aware security schemes as Biba or BLP[3, 2], which software.
    [Show full text]
  • Ted Ts'o on Linux File Systems
    Ted Ts’o on Linux File Systems An Interview RIK FARROW Rik Farrow is the Editor of ;login:. ran into Ted Ts’o during a tutorial luncheon at LISA ’12, and that later [email protected] sparked an email discussion. I started by asking Ted questions that had I puzzled me about the early history of ext2 having to do with the perfor- mance of ext2 compared to the BSD Fast File System (FFS). I had met Rob Kolstad, then president of BSDi, because of my interest in the AT&T lawsuit against the University of California and BSDi. BSDi was being sued for, among other things, Theodore Ts’o is the first having a phone number that could be spelled 800-ITS-UNIX. I thought that it was important North American Linux for the future of open source operating systems that AT&T lose that lawsuit. Kernel Developer, having That said, when I compared the performance of early versions of Linux to the current version started working with Linux of BSDi, I found that they were closely matched, with one glaring exception. Unpacking tar in September 1991. He also archives using Linux (likely .9) was blazingly fast compared to BSDi. I asked Rob, and he served as the tech lead for the MIT Kerberos explained that the issue had to do with synchronous writes, finally clearing up a mystery for me. V5 development team, and was the architect at IBM in charge of bringing real-time Linux Now I had a chance to ask Ted about the story from the Linux side, as well as other questions in support of real-time Java to the US Navy.
    [Show full text]
  • Membrane: Operating System Support for Restartable File Systems
    Membrane: Operating System Support for Restartable File Systems SWAMINATHAN SUNDARARAMAN, SRIRAM SUBRAMANIAN, ABHISHEK RAJIMWALE, ANDREA C. ARPACI-DUSSEAU, REMZI H. ARPACI-DUSSEAU, and MICHAEL M. SWIFT University of Wisconsin-Madison We introduce Membrane, a set of changes to the operating system to support restartable file systems. Membrane allows an operating system to tolerate a broad class of file system failures, and does so while remaining transparent to running applications; upon failure, the file system restarts, its state is restored, and pending application requests are serviced as if no failure had occurred. Membrane provides transparent recovery through a lightweight logging and checkpoint infrastructure, and includes novel techniques to improve performance and correctness of its fault- 11 anticipation and recovery machinery. We tested Membrane with ext2, ext3, and VFAT. Through experimentation, we show that Membrane induces little performance overhead and can tolerate a wide range of file system crashes. More critically, Membrane does so with little or no change to existing file systems, thus improving robustness to crashes without mandating intrusive changes to existing file-system code. Categories and Subject Descriptors: D.4.5 [Operating Systems]: Reliability—Fault-tolerance General Terms: Design, Algorithms, Reliability Additional Key Words and Phrases: Checkpointing, restartability, fault recovery, file systems ACM Reference Format: Sundararaman, S., Subramanian, S., Rajimwale, A., Arpaci-Dusseau, A. C., Arpaci-Dusseau, R. H., and Swift, M. M. 2010. Membrane: Operating System Support for Restartable File Systems. ACM Trans. Storage 6, 3, Article 11 (September 2010), 30 pages. DOI = 10.1145/1837915.1837919 http://doi.acm.org/10.1145/1837915.1837919 An earlier version of this paper appeared in the Proceedings of the 8th File and Storage Technologies Conference (FAST).
    [Show full text]