Lustre 1.8 Operations Manual

Total Page:16

File Type:pdf, Size:1020Kb

Lustre 1.8 Operations Manual Lustre™ 1.8 Operations Manual Part No. 821-0035-12 Lustre manual version: Lustre_1.8_man_v1.4 June 2011 Copyright© 2007-2010 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. U.S. Government Rights - Commercial software. Government users are subject to the Sun Microsystems, Inc. standard license agreement and applicable provisions of the FAR and its supplements. Sun, Sun Microsystems, the Sun logo and Lustre are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Products covered by and information contained in this service manual are controlled by U.S. Export Control laws and may be subject to the export or import laws in other countries. Nuclear, missile, chemical biological weapons or nuclear maritime end uses or end users, whether direct or indirect, are strictly prohibited. Export or reexport to countries subject to U.S. embargo or to entities identified on U.S. export exclusion lists, including, but not limited to, the denied persons and specially designated nationals lists is strictly prohibited. DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License. To view a copy of this license and obtain more information about Creative Commons licensing, visit Creative Commons Attribution-Share Alike 3.0 United States or send a letter to Creative Commons, 171 2nd Street, Suite 300, San Francisco, California 94105, USA. Please Recycle Please Recycle Contents Preface xxv Part I Lustre Architecture 1. Introduction to Lustre 1–1 1.1 Introducing the Lustre File System 1–2 1.1.1 Lustre Key Features 1–3 1.2 Lustre Components 1–5 1.2.1 Lustre Networking (LNET) 1–7 1.2.2 Management Server (MGS) 1–7 1.3 Lustre Systems 1–8 1.4 Files in the Lustre File System 1–10 1.4.1 Lustre File System and Striping 1–12 1.4.2 Lustre Storage 1–13 1.4.2.1 OSS Storage 1–13 1.4.2.2 MDS Storage 1–13 1.4.3 Lustre System Capacity 1–14 1.5 Lustre Configurations 1–14 1.6 Lustre Networking 1–16 1.7 Lustre Failover and Rolling Upgrades 1–17 v 2. Understanding Lustre Networking 2–1 2.1 Introduction to LNET 2–1 2.2 Supported Network Types 2–2 2.3 Designing Your Lustre Network 2–3 2.3.1 Identify All Lustre Networks 2–3 2.3.2 Identify Nodes to Route Between Networks 2–3 2.3.3 Identify Network Interfaces to Include/Exclude from LNET 2–3 2.3.4 Determine Cluster-wide Module Configuration 2–4 2.3.5 Determine Appropriate Mount Parameters for Clients 2–4 2.4 Configuring LNET 2–5 2.4.1 Module Parameters 2–5 2.4.1.1 Using Usocklnd 2–7 2.4.1.2 OFED InfiniBand Options 2–8 2.4.2 Module Parameters - Routing 2–8 2.4.2.1 LNET Routers 2–11 2.4.3 Downed Routers 2–12 2.5 Starting and Stopping LNET 2–13 2.5.1 Starting LNET 2–13 2.5.1.1 Starting Clients 2–13 2.5.2 Stopping LNET 2–14 Part II Lustre Administration 3. Installing Lustre 3–1 3.1 Preparing to Install Lustre 3–2 3.1.1 Supported Operating System, Platform and Interconnect 3–3 3.1.2 Required Lustre Software 3–4 3.1.3 Required Tools and Utilities 3–4 3.1.4 (Optional) High-Availability Software 3–4 vi Lustre 1.8 Operations Manual • June 2011 3.1.5 Debugging Tools 3–5 3.1.6 Environmental Requirements 3–6 3.1.7 Memory Requirements 3–7 3.1.7.1 MDS Memory Requirements 3–7 3.1.7.2 OSS Memory Requirements 3–8 3.2 Installing Lustre from RPMs 3–10 3.3 Installing Lustre from Source Code 3–14 3.3.1 Patching the Kernel 3–15 3.3.1.1 Introducing the Quilt Utility 3–15 3.3.1.2 Get the Lustre Source and Unpatched Kernel 3–16 3.3.1.3 Patch the Kernel 3–17 3.3.2 Create and Install the Lustre Packages 3–18 3.3.3 Installing Lustre with a Third-Party Network Stack 3–20 4. Configuring Lustre 4–1 4.1 Configuring the Lustre File System 4–2 4.1.0.1 Simple Lustre Configuration Example 4–5 4.1.0.2 Module Setup 4–10 4.1.1 Scaling the Lustre File System 4–10 4.2 Additional Lustre Configuration 4–10 4.3 Basic Lustre Administration 4–11 4.3.1 Specifying the File System Name 4–12 4.3.2 Starting up Lustre 4–12 4.3.3 Mounting a Server 4–13 4.3.4 Unmounting a Server 4–14 4.3.5 Working with Inactive OSTs 4–14 4.3.6 Finding Nodes in the Lustre File System 4–15 4.3.7 Mounting a Server Without Lustre Service 4–16 4.3.8 Specifying Failout/Failover Mode for OSTs 4–16 Contents vii 4.3.9 Running Multiple Lustre File Systems 4–17 4.3.10 Setting and Retrieving Lustre Parameters 4–19 4.3.10.1 Setting Parameters with mkfs.lustre 4–19 4.3.10.2 Setting Parameters with tunefs.lustre 4–19 4.3.10.3 Setting Parameters with lctl 4–20 4.3.10.4 Reporting Current Parameter Values 4–21 4.3.11 Regenerating the Lustre Configuration Logs 4–22 4.3.12 Changing a Server NID 4–23 4.3.13 Removing and Restoring OSTs 4–24 4.3.13.1 Removing an OST from the File System 4–24 4.3.13.2 Restoring an OST in the File System 4–26 4.3.14 Aborting Recovery 4–26 4.3.15 Determining Which Machine is Serving an OST 4–27 4.4 More Complex Configurations 4–28 4.4.1 Failover 4–28 4.5 Operational Scenarios 4–29 4.5.1 Unmounting a Server (without Failover) 4–31 4.5.2 Unmounting a Server (with Failover) 4–31 4.5.3 Changing the Address of a Failover Node 4–31 5. Service Tags 5–1 5.1 Introduction to Service Tags 5–1 5.2 Using Service Tags 5–2 5.2.1 Installing Service Tags 5–2 5.2.2 Discovering and Registering Lustre Components 5–3 5.2.3 Information Registered with Sun 5–6 6. Configuring Lustre - Examples 6–1 6.1 Simple TCP Network 6–1 viii Lustre 1.8 Operations Manual • June 2011 6.1.1 Lustre with Combined MGS/MDT 6–1 6.1.1.1 Installation Summary 6–1 6.1.1.2 Configuration Generation and Application 6–2 6.1.2 Lustre with Separate MGS and MDT 6–3 6.1.2.1 Installation Summary 6–3 6.1.2.2 Configuration Generation and Application 6–3 6.1.2.3 Configuring Lustre with a CSV File 6–4 7. More Complicated Configurations 7–1 7.1 Multihomed Servers 7–1 7.1.1 Modprobe.conf 7–1 7.1.2 Start Servers 7–3 7.1.3 Start Clients 7–4 7.2 Elan to TCP Routing 7–5 7.2.1 Modprobe.conf 7–5 7.2.2 Start servers 7–5 7.2.3 Start clients 7–5 7.3 Load Balancing with InfiniBand 7–6 7.3.1 Setting Up modprobe.conf for Load Balancing 7–6 7.4 Multi-Rail Configurations with LNET 7–7 8. Failover 8–1 8.1 What is Failover? 8–1 8.1.1 Failover Capabilities 8–2 8.1.2 Types of Failover Configurations 8–2 8.2 Failover Functionality in Lustre 8–3 8.2.1 MDT Failover Configuration (Active/Passive) 8–4 8.2.2 OST Failover Configuration (Active/Active) 8–4 8.2.3 Lustre Failover and MMP 8–4 Contents ix 8.2.3.1 Working with MMP 8–5 8.3 Configuring and Using Heartbeat with Lustre Failover 8–6 8.3.1 Creating a Failover Environment 8–6 8.3.1.1 Power Management Software 8–6 8.3.1.2 Power Equipment 8–7 8.3.2 Setting up the Heartbeat Software 8–7 8.3.2.1 Installing Heartbeat 8–8 8.3.2.2 Configuring Heartbeat 8–8 8.3.2.3 (Optional) Migrating a Heartbeat Configuration (v1 to v2) 8–13 8.3.3 Working with Heartbeat 8–14 8.3.3.1 Starting Heartbeat 8–14 8.3.3.2 Switching Resources Between Nodes 8–14 9. Configuring Quotas 9–1 9.1 Working with Quotas 9–1 9.1.1 Enabling Disk Quotas 9–2 9.1.1.1 Administrative and Operational Quotas 9–3 9.1.2 Creating Quota Files and Quota Administration 9–4 9.1.3 Quota Allocation 9–7 9.1.4 Known Issues with Quotas 9–10 9.1.4.1 Granted Cache and Quota Limits 9–10 9.1.4.2 Quota Limits 9–11 9.1.4.3 Quota File Formats 9–12 9.1.5 Lustre Quota Statistics 9–13 9.1.5.1 Interpreting Quota Statistics 9–14 10.
Recommended publications
  • Storage Administration Guide Storage Administration Guide SUSE Linux Enterprise Server 12 SP4
    SUSE Linux Enterprise Server 12 SP4 Storage Administration Guide Storage Administration Guide SUSE Linux Enterprise Server 12 SP4 Provides information about how to manage storage devices on a SUSE Linux Enterprise Server. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xii 1 Available Documentation xii 2 Giving Feedback xiv 3 Documentation Conventions xiv 4 Product Life Cycle and Support xvi Support Statement for SUSE Linux Enterprise Server xvii • Technology Previews xviii I FILE SYSTEMS AND MOUNTING 1 1 Overview
    [Show full text]
  • Filesystem Maintenance
    Filesystem Maintenance René Serral-Gracià Xavier Martorell-Bofill1 1Universitat Politècnica de Catalunya (UPC) May 26, 2014 Introduction Filesystems Disk verification LVM Backups Lectures 1 System administration introduction 2 Operating System installation 3 User management 4 Application management 5 System monitoring 6 Filesystem Maintenance 7 Local services 8 Network services 9 Security and Protection 10 Virtualization R. Serral-Gracià, et. al Filesystem 2 Introduction Filesystems Disk verification LVM Backups Outline 1 Introduction Goals 2 Filesystems 3 Disk verification 4 Logical Volume Manager (LVM) 5 Backups R. Serral-Gracià, et. al Filesystem 3 Introduction Filesystems Disk verification LVM Backups Goals Knowledge Filesystems Backup tools Backup media Abilities Filesystem ampliation Filesystem verification Perform and restore backups R. Serral-Gracià, et. al Filesystem 4 Introduction Filesystems Disk verification LVM Backups Outline 1 Introduction 2 Filesystems 3 Disk verification 4 Logical Volume Manager (LVM) 5 Backups R. Serral-Gracià, et. al Filesystem 5 Introduction Filesystems Disk verification LVM Backups Filesystems (I) FAT (FAT16) –> DOS Small disks (< 4GB) File names 8+3 FAT32 (VFAT) –> Win95 Larger disks Long filenames Partial definition of soft-links No owner or file access privileges exFAT FAT32 Extension Theoretical maximum capacity of 64ZiB (512TiB real) NTFS –> WinNT, XP, Vista, Windows 7 Integrates ownership and privileges (create, modify, access...) Maps to Windows NT security model R. Serral-Gracià, et. al Filesystem 6 Introduction Filesystems Disk verification LVM Backups Filesystems (II) ext2 UNIX Filesystem Soft/hard links Access privileges Long filenames ext3 Adds journaling (eases error recovery) reiserfs Files and directories organized similarly to a database Features journaling Very efficient in small files No internal block fragmentation R.
    [Show full text]
  • Linux Commands Cheat Sheet
    LINUX COMMANDS CHEAT SHEET System File Permission uname => Displays Linux system information chmod octal filename => Change file permissions of the file to octal uname -r => Displays kernel release information Example uptime => Displays how long the system has been running including chmod 777 /data/test.c => Set rwx permissions to owner, group and everyone (every- load average one else who has access to the server) hostname => Shows the system hostname chmod 755 /data/test.c => Set rwx to the owner and r_x to group and everyone hostname -i => Displays the IP address of the system chmod 766 /data/test.c => Sets rwx for owner, rw for group and everyone last reboot => Shows system reboot history chown owner user-file => Change ownership of the file date => Displays current system date and time chown owner-user: owner-group => Change owner and group owner of the file timedatectl => Query and change the System clock file_name chown owner-user:owner-group- => Change owner and group owner of the directory cal => Displays the current calendar month and day directory w => Displays currently logged in users in the system whoami => Displays who you are logged in as Network finger username => Displays information about the user ip addr show => Displays IP addresses and all the network interfaces Hardware ip address add => Assigns IP address 192.168.0.1 to interface eth0 192.168.0.1/24 dev eth0 dmesg => Displays bootup messages ifconfig => Displays IP addresses of all network interfaces cat /proc/cpuinfo => Displays more information about CPU e.g model, model name, cores, vendor id ping host => ping command sends an ICMP echo request to establish a connection to server / PC cat /proc/meminfo => Displays more information about hardware memory e.g.
    [Show full text]
  • NVIDIA Magnum IO Gpudirect Storage
    NVIDIA Magnum IO GPUDirect Storage Installation and Troubleshooting Guide TB-10112-001_v1.0.0 | August 2021 Table of Contents Chapter 1. Introduction........................................................................................................ 1 Chapter 2. Installing GPUDirect Storage.............................................................................2 2.1. Before You Install GDS.............................................................................................................2 2.2. Installing GDS............................................................................................................................3 2.2.1. Removal of Prior GDS Installation on Ubuntu Systems...................................................3 2.2.2. Preparing the OS................................................................................................................3 2.2.3. GDS Package Installation.................................................................................................. 4 2.2.4. Verifying the Package Installation.....................................................................................4 2.2.5. Verifying a Successful GDS Installation............................................................................5 2.3. Installed GDS Libraries and Tools...........................................................................................6 2.4. Uninstalling GPUDirect Storage...............................................................................................7 2.5. Environment
    [Show full text]
  • Chapter 19 RECOVERING DIGITAL EVIDENCE from LINUX SYSTEMS
    Chapter 19 RECOVERING DIGITAL EVIDENCE FROM LINUX SYSTEMS Philip Craiger Abstract As Linux-kernel-based operating systems proliferate there will be an in­ evitable increase in Linux systems that law enforcement agents must process in criminal investigations. The skills and expertise required to recover evidence from Microsoft-Windows-based systems do not neces­ sarily translate to Linux systems. This paper discusses digital forensic procedures for recovering evidence from Linux systems. In particular, it presents methods for identifying and recovering deleted files from disk and volatile memory, identifying notable and Trojan files, finding hidden files, and finding files with renamed extensions. All the procedures are accomplished using Linux command line utilities and require no special or commercial tools. Keywords: Digital evidence, Linux system forensics !• Introduction Linux systems will be increasingly encountered at crime scenes as Linux increases in popularity, particularly as the OS of choice for servers. The skills and expertise required to recover evidence from a Microsoft- Windows-based system, however, do not necessarily translate to the same tasks on a Linux system. For instance, the Microsoft NTFS, FAT, and Linux EXT2/3 file systems work differently enough that under­ standing one tells httle about how the other functions. In this paper we demonstrate digital forensics procedures for Linux systems using Linux command line utilities. The ability to gather evidence from a running system is particularly important as evidence in RAM may be lost if a forensics first responder does not prioritize the collection of live evidence. The forensic procedures discussed include methods for identifying and recovering deleted files from RAM and magnetic media, identifying no- 234 ADVANCES IN DIGITAL FORENSICS tables files and Trojans, and finding hidden files and renamed files (files with renamed extensions.
    [Show full text]
  • “Linux at the Command Line” Don Johnson of BU IS&T  We’Ll Start with a Sign in Sheet
    “Linux at the Command Line” Don Johnson of BU IS&T We’ll start with a sign in sheet. We’ll end with a class evaluation. We’ll cover as much as we can in the time allowed; if we don’t cover everything, you’ll pick it up as you continue working with Linux. This is a hands-on, lab class; ask questions at any time. Commands for you to type are in BOLD The Most Common O/S Used By BU Researchers When Working on a Server or Computer Cluster Linux is a Unix clone begun in 1991 and written from scratch by Linus Torvalds with assistance from a loosely-knit team of hackers across the Net. 64% of the world’s servers run some variant of Unix or Linux. The Android phone and the Kindle run Linux. a set of small Linux is an O/S core programs written by written by Linus Richard Stallman and Torvalds and others others. They are the AND GNU utilities. http://www.gnu.org/ Network: ssh, scp Shells: BASH, TCSH, clear, history, chsh, echo, set, setenv, xargs System Information: w, whoami, man, info, which, free, echo, date, cal, df, free Command Information: man, info Symbols: |, >, >>, <, ;, ~, ., .. Filters: grep, egrep, more, less, head, tail Hotkeys: <ctrl><c>, <ctrl><d> File System: ls, mkdir, cd, pwd, mv, touch, file, find, diff, cmp, du, chmod, find File Editors: gedit, nedit You need a “xterm” emulation – software that emulates an “X” terminal and that connects using the “SSH” Secure Shell protocol. ◦ Windows Use StarNet “X-Win32:” http://www.bu.edu/tech/support/desktop/ distribution/xwindows/xwin32/ ◦ Mac OS X “Terminal” is already installed Why? Darwin, the system on which Apple's Mac OS X is built, is a derivative of 4.4BSD-Lite2 and FreeBSD.
    [Show full text]
  • BSD UNIX Toolbox 1000+ Commands for Freebsd, Openbsd
    76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page i BSD UNIX® TOOLBOX 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iv BSD UNIX® Toolbox: 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD® Power Users Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-37603-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data is available from the publisher. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permis- sion should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • Singularityce User Guide Release 3.8
    SingularityCE User Guide Release 3.8 SingularityCE Project Contributors Aug 16, 2021 CONTENTS 1 Getting Started & Background Information3 1.1 Introduction to SingularityCE......................................3 1.2 Quick Start................................................5 1.3 Security in SingularityCE........................................ 15 2 Building Containers 19 2.1 Build a Container............................................. 19 2.2 Definition Files.............................................. 24 2.3 Build Environment............................................ 35 2.4 Support for Docker and OCI....................................... 39 2.5 Fakeroot feature............................................. 79 3 Signing & Encryption 83 3.1 Signing and Verifying Containers.................................... 83 3.2 Key commands.............................................. 88 3.3 Encrypted Containers.......................................... 90 4 Sharing & Online Services 95 4.1 Remote Endpoints............................................ 95 4.2 Cloud Library.............................................. 103 5 Advanced Usage 109 5.1 Bind Paths and Mounts.......................................... 109 5.2 Persistent Overlays............................................ 115 5.3 Running Services............................................. 118 5.4 Environment and Metadata........................................ 129 5.5 OCI Runtime Support.......................................... 140 5.6 Plugins.................................................
    [Show full text]
  • Oracle® Linux 7 Managing File Systems
    Oracle® Linux 7 Managing File Systems F32760-07 August 2021 Oracle Legal Notices Copyright © 2020, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Filesystem Considerations for Embedded Devices ELC2015 03/25/15
    Filesystem considerations for embedded devices ELC2015 03/25/15 Tristan Lelong Senior embedded software engineer Filesystem considerations ABSTRACT The goal of this presentation is to answer a question asked by several customers: which filesystem should you use within your embedded design’s eMMC/SDCard? These storage devices use a standard block interface, compatible with traditional filesystems, but constraints are not those of desktop PC environments. EXT2/3/4, BTRFS, F2FS are the first of many solutions which come to mind, but how do they all compare? Typical queries include performance, longevity, tools availability, support, and power loss robustness. This presentation will not dive into implementation details but will instead summarize provided answers with the help of various figures and meaningful test results. 2 TABLE OF CONTENTS 1. Introduction 2. Block devices 3. Available filesystems 4. Performances 5. Tools 6. Reliability 7. Conclusion Filesystem considerations ABOUT THE AUTHOR • Tristan Lelong • Embedded software engineer @ Adeneo Embedded • French, living in the Pacific northwest • Embedded software, free software, and Linux kernel enthusiast. 4 Introduction Filesystem considerations Introduction INTRODUCTION More and more embedded designs rely on smart memory chips rather than bare NAND or NOR. This presentation will start by describing: • Some context to help understand the differences between NAND and MMC • Some typical requirements found in embedded devices designs • Potential filesystems to use on MMC devices 6 Filesystem considerations Introduction INTRODUCTION Focus will then move to block filesystems. How they are supported, what feature do they advertise. To help understand how they compare, we will present some benchmarks and comparisons regarding: • Tools • Reliability • Performances 7 Block devices Filesystem considerations Block devices MMC, EMMC, SD CARD Vocabulary: • MMC: MultiMediaCard is a memory card unveiled in 1997 by SanDisk and Siemens based on NAND flash memory.
    [Show full text]
  • Iphone Text Messages Read Receipt
    Iphone Text Messages Read Receipt When Gabriel attune his manages double-talk not blankety-blank enough, is Morgan lengthening? Undulant Roscoe sideswiping, his Cinzano frap crumbling boundlessly. Dwain delete her pyracanth collectively, reviewable and remonstrant. Read by francis navarro, letting us about with or text messages to such content and hold down according to appear in the advantages of the only stub undefined methods can About Direct Messages Twitter Help Center. In a lot more timely manner as an iphone text messages read receipt does the message read on group conversation participants. How they Disable iMessage Read Receipts on iPhone. With iOS 10 you get to verify whether penalty not you'll sleep read receipts with each. How close Not Show When Text you Read write an iPhone. Received the message with an acknowledged DLR delivery receipt. How to surge Off Read Receipts on iPhone for iMessage. The Messages app on the iPhone is project of sending and. You have read receipts on your negativity iphone text messages read receipt? Why are iMessages being happy as SMS Text Messages. Or not aware has received or read your most recent message. I don't care much means people give I trash the message but didn't respond. If i send both text via iMessage to another iPhone you will inspire the. How to Secretly Open iMessages Without Triggering Read. This WhatsApp status trick involves 'Read receipt' log of the messenger These receipts are upcoming check marks that appear friendly to each message you list If raw Read receipts are enabled then the sender will swarm to cough when hisher message is read.
    [Show full text]
  • Journaling File Systems
    Linux Journaling File Systems Linux onzSeries Journaling File Systems Volker Sameske ([email protected]) Linux on zSeries Development IBM Lab Boeblingen, Germany Share Anaheim,California February27 –March 4,2005 Session 9257 ©2005 IBM Corporation Linux Journaling File Systems Agenda o File systems. • Overview, definitions. • Reliability, scalability. • File system features. • Common grounds & differences. o Volume management. • LVM, EVMS, MD. • Striping. o Measurement results. • Hardware/software setup. • throughput. • CPU load. 2 Session 9257 © 2005 IBM Corporation Linux Journaling File Systems A file system should... o ...store data o ...organize data o ...administrate data o ...organize data about the data o ...assure integrity o ...be able to recover integrity problems o ...provide tools (expand, shrink, check, ...) o ...be able to handle many and large files o ...be fast o ... 3 Session 9257 © 2005 IBM Corporation Linux Journaling File Systems File system-definition o Informally • The mechanism by which computer files are stored and organized on a storage device. o More formally, • A set of abstract data types that are necessary for the storage, hierarchical organization, manipulation, navigation, access and retrieval of data. 4 Session 9257 © 2005 IBM Corporation Linux Journaling File Systems Why a journaling file system? o Imagine your Linux system crashs while you are saving an edited file: • The system crashs after the changes have been written to disk à good crash • The system crashs before the changes have been written to disk à bad crash but bearable if you have an older version • The sytem crashs just in the moment your data will be written: à very bad crash your file could be corrupted and in worst case the file system could be corrupted à That‘s why you need a journal 5 Session 9257 © 2005 IBM Corporation Linux Journaling File Systems Somefilesystemterms o Meta data • "Data about the data" • File system internal data structure (e.g.
    [Show full text]