Chapter 14: File System Implementation

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 14: File System Implementation Chapter 14: File System Implementation Operating System Concepts – 10th dition Silberschatz, Galvin and Gagne ©2018 Chapter 14: File System Implementation File-System Structure File-System Operations Directory Implementation Allocation Methods Free-Space Management Efficiency and Performance Reco ery Example: WAFL File System Operating System Concepts – 10th dition 1!"2 Silberschatz, Galvin and Gagne ©2018 Objectives Describe the details of implementing local file systems and directory structures Discuss %lock allocation and free-block algorithms and trade-offs Explore file system efficiency and performance issues $oo' at reco ery from file system failures Describe the WAF$ file system as a concrete example Operating System Concepts – 10th dition 1!"# Silberschatz, Galvin and Gagne ©2018 File-System Structure File structure $ogical storage unit )ollection of related information $ile system resides on secondary storage *dis's+ Pro ided user interface to storage, mapping logical to physical Pro ides efficient and con enient access to dis' %y allo-ing data to %e stored, located retrie ed easily Dis' pro ides in-place rewrite and random access I.O transfers performed in bloc%s of sectors *usually /01 %ytes+ $ile control bloc% *$C&+ 2 storage structure consisting of information a%out a &le Device driver controls the physical de ice File system organi3ed into layers Operating System Concepts – 10th dition 1!"! Silberschatz, Galvin and Gagne ©2018 Layered File System Operating System Concepts – 10th dition 1!"( Silberschatz, Galvin and Gagne ©2018 File System Layers 'evice drivers manage I/O devices at the I/O control layer Given commands like 5read drive1, cylinder 72, track 1, sector 00, into memory location 10879 outputs low-level hardware speci&c commands to hardware controller &asic file system given command like 5retrieve block 12:9 translates to device driver Also manages memory buffers and caches (allocation, freeing, replacement) Bu(ers hold data in transit )aches hold frequently used data File organization module understands files, logical address, and physical blocks Translates logical block # to physical block # Manages free space, disk allocation Operating System Concepts – 10th dition 1!") Silberschatz, Galvin and Gagne ©2018 File System Layers (Cont.) Logical file system manages metadata information Translates file name into file number, file handle, location %y maintaining file control %locks inodes( in ?NIX) Directory management Protection $ayering useful for reducing complexity and redundancy, %ut adds overhead and can decrease performance=ranslates &le name into file number, file handle, location by maintaining file control blocks (inodes in UNIA+ $ogical layers can %e implemented by any coding method according to OS designer Operating System Concepts – 10th dition 1!", Silberschatz, Galvin and Gagne ©2018 File System Layers (Cont.) Many file systems, sometimes many within an operating system Each with its own format (CD-ROM is ISO B880; ?nix has .$S, FFS; Windows has FAT, FAT32, NTFS as well as floppy, CD, DVD Blu-ray, Linux has more than 130 types, -ith extended file system ext: and e!t4 leading; plus distributed file systems, etcG+ @ew ones still arriving – ZFS, GoogleFS, Oracle ASM, FUSE Operating System Concepts – 10th dition 1!"8 Silberschatz, Galvin and Gagne ©2018 File-System Operations We have system calls at the API level, %ut how do we implement their functions? On-disk and in-memory structures Boot control block contains info needed by system to boot OS from that volume @eeded if volume contains OS, usually &rst block of volume Volume control block 2s+perblock, master file table3 contains volume details Total # of blocks, # of free blocks, block size, free block pointers or array Directory structure organizes the files @ames and inode numbers, master file table Operating System Concepts – 10th dition 1!"0 Silberschatz, Galvin and Gagne ©2018 File-System Implementation (Cont.) Per-fileFile Control &lock 2FCB3 contains many details about the file typically inode number, permissions, size, dates @FTS stores into in master file table using relational DB structures Operating System Concepts – 10th dition 1!"10 Silberschatz, Galvin and Gagne ©2018 In-Memory File System Structures 4o+nt table storing &le system mounts, mount points, &le system types system56ide open5*le table contains a copy of the F)B of each &le and other info per5process open5*le table contains pointers to appropriate entries in system--ide open-&le table as -ell as other info =he following &gure illustrates the necessary &le system structures provided by the operating systems Figure 01-3(a) refers to opening a &le Figure 01-3*%+ refers to reading a &le Plus buffers hold data bloc's from secondary storage Open returns a &le handle for subsequent use Data from read eventually copied to specified user process memory address Operating System Concepts – 10th dition 1!"11 Silberschatz, Galvin and Gagne ©2018 In-Memory File System Structures Operating System Concepts – 10th dition 1!"12 Silberschatz, Galvin and Gagne ©2018 Directory Implementation Linear list of file names with pointer to the data blocks Simple to program Time-consuming to execute $inear search time )ould keep ordered alphabetically via linked list or use ;J tree 7ash Table – linear list with hash data structure Decreases directory search time Collisions 2 situations -here t-o file names hash to the same location Only good if entries are fixed size, or use chained-overflow method Operating System Concepts – 10th dition 1!"1# Silberschatz, Galvin and Gagne ©2018 Allocation Methods - Contiguous An allocation method refers to how disk %locks are allocated for &les: Contiguous allocation – each file occupies set of contiguous blocks Best performance in most cases Simple – only starting location (block >) and length (number of %loc's) are required Problems include finding space for file, knowing file size, external fragmentation, need for compaction off-line *downtime) or on-line Operating System Concepts – 10th dition 1!"1! Silberschatz, Galvin and Gagne ©2018 Contiguous Allocation Mapping from logical to physical K $A//01 R ;lock to be accessed L K J starting address Displacement into %lock L R Operating System Concepts – 10th dition 1!"1( Silberschatz, Galvin and Gagne ©2018 Extent-Based Systems Many newer &le systems (iGeG, Veritas File System+ use a modified contiguous allocation scheme Extent-based file systems allocate disk blocks in extents An extent is a contiguous block of disks Extents are allocated for &le allocation A file consists of one or more extents Operating System Concepts – 10th dition 1!"1) Silberschatz, Galvin and Gagne ©2018 Allocation Methods - Linked Linked allocation 2 each file a linked list of blocks File ends at nil pointer @o external fragmentation Each block contains pointer to next %lock @o compaction, external fragmentation Free space management system called -hen new %loc' needed Improve efficiency by clustering blocks into groups but increases internal fragmentation Reliability can %e a problem $ocating a block can take many I/Os and dis' seeks Operating System Concepts – 10th dition 1!"1, Silberschatz, Galvin and Gagne ©2018 Linked Allocation Each file is a linked list of disk blocks: blocks may be scattered anywhere on the dis' %loc' L pointer Mapping K LA/510 R Block to %e accessed is the Qth block in the linked chain of blocks representing the file. Displacement into block = R + 1 Operating System Concepts – 10th dition 1!"10 Silberschatz, Galvin and Gagne ©2018 Linked Allocation Operating System Concepts – 10th dition 1!"20 Silberschatz, Galvin and Gagne ©2018 File-Allocation Table Operating System Concepts – 10th dition 1!"21 Silberschatz, Galvin and Gagne ©2018 Allocation Methods - Indexed Indexed allocation Each file has its ownindex block(s) of pointers to its data blocks $ogical view index table Operating System Concepts – 10th dition 1!"22 Silberschatz, Galvin and Gagne ©2018 Example of Indexed Allocation Operating System Concepts – 10th dition 1!"2# Silberschatz, Galvin and Gagne ©2018 Combined Scheme: UNIX UFS 4K bytes per block, 32-bit addresses More index blocks than can be addressed with 32-bit file pointer Operating System Concepts – 10th dition 1!"28 Silberschatz, Galvin and Gagne ©2018 Performance ;est method depends on &le access type )ontiguous great for sequential and random $in'ed good for sequential, not random Declare access type at creation -M select either contiguous or lin'ed Inde!ed more comple! Single %loc' access could require 1 inde! %loc' reads then data %loc' read )lustering can help impro e throughput, reduce )P? overhead For @EM, no dis' head so different algorithms and optimizations needed ?sing old algorithm uses many )P? cycles trying to avoid non- e!istent head movement #ith @EM goal is to reduce )P? cycles and overall path needed for I.O Operating System Concepts – 10th dition 1!"20 Silberschatz, Galvin and Gagne ©2018 Free-Space Management File system maintains free-space list to track available blocks/clusters *?sing term 5block9 for simplicity) &it vector or bit map *n %locks) 7 0 1 n-1 N 0 block[i] free %itO ] = i 7 %loc'OiP occupied Block number calculation (number of bits per -ord) Q (number of 0-value words) + o(set of first 1 bit CPUs have instructions to return o(set -ithin word of first 509 bit Operating System Concepts – 10th dition 1!"#1 Silberschatz, Galvin and Gagne ©2018 Free-Space
Recommended publications
  • Everything You Need to Know About Apple File System for Macos
    WHITE PAPER Everything you need to know about Apple File System for macOS Picture it: the ship date for macOS High Sierra has arrived. Sweat drips down your face; your hands shake as you push “upgrade.” How did I get here? What will happen to my policies? Is imaging dead? Fear not, because the move from HFS+ (the current Mac file system) to Apple File System (APFS) with macOS High Sierra is a good thing. And, with this handy guide, you’ll have everything you need to prepare your environment. In short, don’t fear APFS. To see how Jamf Pro can facilitate seamless macOS High Sierra upgrades in your environment, visit: www.jamf.com • After upgrading to macOS High Sierra, end users will Wait, how did we get here? likely see less total space consumed on a volume due to new cloning options. Bonus: End users can store HFS, and the little known MFS, were introduced in 1984 up to nine quintillion files on a single volume. with the original Macintosh. Fast forward 13 years, and • APFS provides us with a new feature called HFS+ served as a major file system upgrade for the Mac. snapshots. Snapshots make backups work more In fact, it was such a robust file system that it’s been the efficiently and offer a new way to revert changes primary file system on Apple devices. That is all about to back to a given point in time. As snapshots evolve change with APFS. and APIs become available, third-party vendors will Nineteen years after HFS+ was rolled out, Apple be able to build new workflows using this feature.
    [Show full text]
  • Episode Engine User’S Guide
    Note on License The accompanying Software is licensed and may not be distributed without writ- ten permission. Disclaimer The contents of this document are subject to revision without notice due to con- tinued progress in methodology, design, and manufacturing. Telestream shall have no liability for any error or damages of any kind resulting from the use of this doc- ument and/or software. The Software may contain errors and is not designed or intended for use in on-line facilities, aircraft navigation or communications systems, air traffic control, direct life support machines, or weapons systems (“High Risk Activities”) in which the failure of the Software would lead directly to death, personal injury or severe physical or environmental damage. You represent and warrant to Telestream that you will not use, distribute, or license the Software for High Risk Activities. Export Regulations. Software, including technical data, is subject to Swedish export control laws, and its associated regulations, and may be subject to export or import regulations in other countries. You agree to comply strictly with all such regulations and acknowledge that you have the responsibility to obtain licenses to export, re-export, or import Software. Copyright Statement ©Telestream, Inc, 2010 All rights reserved. No part of this document may be copied or distributed. This document is part of the software product and, as such, is part of the license agreement governing the software. So are any other parts of the software product, such as packaging and distribution media. The information in this document may be changed without prior notice and does not represent a commitment on the part of Telestream.
    [Show full text]
  • BLACKLIGHT 2020 R1 Release Notes
    BlackLight 2020 R1 Release Notes April 20, 2020 Thank you for using BlackBag Technologies products. The Release Notes for this version include important information about new features and improvements made to BlackLight. In addition, this document contains known limitations, supported versions, and updated system requirements. While this information is complete at time of release, it is subject to change without notice and is provided for informational purposes only. Summary To enhance our forensic analysis tool, BlackLight 2020 R1 includes: • Apple Keychain Processing • Processing iCloud Productions obtained via search warrants from Apple • Additional processing of Spotlight Artifacts • Updated Recent Items parsing for macOS In Actionable Intel • Parsing AirDrop Artifacts • Updates to information parsed for macOS systems in Extended Information • Added support for log file parsing from logical evidence files or folders • Support added for Volexity Surge Memory images • Email loading process improved for faster load times • Support added for extended attributes in logical evidence files • Newly parsed items added to Smart Index (Keychain, Spotlight, and AirDrop) NEW FEATURES Apple Keychain Processing Keychains are encrypted containers built into macOS and iOS. Keychains store passwords and account information so users do not have to type in usernames and passwords. Form autofill information and secure notes can also be stored in keychains. In macOS a System keychain, accessible by all users, stores AirPort (WiFi) and Time Machine passwords. The System keychain does not require a password to open. Each user account has its own login keychain. By default, each user’s login keychain is opened with the user’s login password. While users can change this, most users do not.
    [Show full text]
  • The Apple Ecosystem
    APPENDIX A The Apple Ecosystem There are a lot of applications used to manage Apple devices in one way or another. Additionally, here’s a list of tools, sorted alphabetically per category in order to remain vendor agnostic. Antivirus Solutions for scanning Macs for viruses and other malware. • AVG: Basic antivirus and spyware detection and remediation. • Avast: Centralized antivirus with a cloud console for tracking incidents and device status. • Avira: Antivirus and a browser extension. Avira Connect allows you to view device status online. • BitDefender: Antivirus and malware managed from a central console. • CarbonBlack: Antivirus and Application Control. • Cylance: Ransomware, advanced threats, fileless malware, and malicious documents in addition to standard antivirus. • Kaspersky: Antivirus with a centralized cloud dashboard to track device status. © Charles Edge and Rich Trouton 2020 707 C. Edge and R. Trouton, Apple Device Management, https://doi.org/10.1007/978-1-4842-5388-5 APPENDIX A THe AppLe ECOSYSteM • Malware Bytes: Antivirus and malware managed from a central console. • McAfee Endpoint Security: Antivirus and advanced threat management with a centralized server to track devices. • Sophos: Antivirus and malware managed from a central console. • Symantec Mobile Device Management: Antivirus and malware managed from a central console. • Trend Micro Endpoint Security: Application whitelisting, antivirus, and ransomware protection in a centralized console. • Wandera: Malicious hot-spot monitoring, jailbreak detection, web gateway for mobile threat detection that integrates with common MDM solutions. Automation Tools Scripty tools used to automate management on the Mac • AutoCasperNBI: Automates the creation of NetBoot Images (read: NBI’s) for use with Casper Imaging. • AutoDMG: Takes a macOS installer (10.10 or newer) and builds a system image suitable for deployment with Imagr, DeployStudio, LANrev, Jamf Pro, and other asr or Apple Systems Restore-based imaging tools.
    [Show full text]
  • 2021-01-14-RECON-IMAGER-Manual.Pdf
    MANUAL 1.Introduction 4 2. Version Comparisons 4 3. Supported Hardware 6 3.1 MODE A - SUPPORTED HARDWARE (Version 4.0.0) 6 3.2 MODE B - BOOT SUPPORTED HARDWARE (Version 5.0.0) 6 3.3 MODE C - SUPPORTED HARDWARE (Version 5.0.2 A1) 7 4. Before You Start 7 4.1 How Will You Process The Image? 7 4.2 What To Image? 8 4.3 What Image Format Should I Use? 8 5. Key Concepts To Understand 9 5.1 Apple File System (APFS) 9 5.2 Apple Extended Attributes 9 5.3 Fusion Drives 10 5.4 Core Storage 10 5.5 FileVault 11 5.6 T2 Security Chipset 11 5.7 Local Time Machine Snapshots (APFS) 12 5.8 Apple Boot Camp 12 6. Booting RECON IMAGER 13 6.1 Instant On - Portable Macs 13 6.2 Firmware Password 13 6.3 Connecting RECON IMAGER 14 6.4 Connecting Your Destination Drive 15 6.5 Starting RECON IMAGER 15 7. Using RECON Imager 17 7.1 Disk Manager 18 7.1.1 Refresh To Detect Changes 19 RECON IMAGER Copyright © 2010-2020 SUMURI LLC 1 of 59 7.1.2 Formatting a Collection Drive 20 7.1.3 Decrypting A FileVault Volume 22 7.1.4 System Date and Time 24 7.2 Disk Imager 24 7.2.1 Source 25 7.2.2 Image Type 25 7.2.3 Compression Options 27 7.2.4 Processing Local Time Machine Snapshots (APFS) 27 7.2.5 Destination 28 7.2.6 Image Name 28 7.2.7 Segment Size 29 7.2.8 Evidence Descriptor Fields 29 7.2.9 Hashing and Verification 30 8.
    [Show full text]
  • Apple File System Reference
    Apple File System Reference Developer Contents About Apple File System 7 General-Purpose Types 9 paddr_t .................................................. 9 prange_t ................................................. 9 uuid_t ................................................... 9 Objects 10 obj_phys_t ................................................ 10 Supporting Data Types ........................................... 11 Object Identifier Constants ......................................... 12 Object Type Masks ............................................. 13 Object Types ................................................ 14 Object Type Flags .............................................. 20 EFI Jumpstart 22 Booting from an Apple File System Partition ................................. 22 nx_efi_jumpstart_t ........................................... 24 Partition UUIDs ............................................... 25 Container 26 Mounting an Apple File System Partition ................................... 26 nx_superblock_t ............................................. 27 Container Flags ............................................... 36 Optional Container Feature Flags ...................................... 37 Read-Only Compatible Container Feature Flags ............................... 38 Incompatible Container Feature Flags .................................... 38 Block and Container Sizes .......................................... 39 nx_counter_id_t ............................................. 39 checkpoint_mapping_t ........................................
    [Show full text]
  • Vmware Workspace ONE UEM Ios Device Management
    iOS Device Management VMware Workspace ONE UEM iOS Device Management You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents 1 Introduction to Managing iOS Devices 7 iOS Admin Task Prerequisites 8 2 iOS Device Enrollment Overview 9 iOS Device Enrollment Requirements 11 Capabilities Based on Enrollment Type for iOS Devices 11 Enroll an iOS Device Using the Workspace ONE Intelligent Hub 14 Enroll an iOS Device Using the Safari Browser 15 Bulk Enrollment of iOS Devices Using Apple Configurator 16 Device Enrollment with the Apple Business Manager's Device Enrollment Program (DEP) 17 User Enrollment 17 Enroll an iOS Device Using User Enrollment 18 App Management on User Enrolled Devices 19 3 Device Profiles 20 Device Passcode Profiles 22 Configure a Device Passcode Profile 23 Device Restriction Profiles 24 Restriction Profile Configurations 24 Configure a Device Restriction Profile 29 Configure a Wi-Fi Profile 30 Configure a Virtual Private Network (VPN) Profile 31 Configure a Forcepoint Content Filter Profile 33 Configure a Blue Coat Content Filter Profile 34 Configure a VPN On Demand Profile 35 Configure a Per-App VPN Profile 38 Configure Public Apps to Use Per App Profile 39 Configure Internal Apps to Use Per App Profile 39 Configure an Email Account Profile 40 Exchange ActiveSync (EAS) Mail for iOS Devices 41 Configure an EAS Mail Profile for the Native Mail Client 41 Configure a Notifications Profile 43 Configure an LDAP Settings Profile 44 Configure a CalDAV or CardDAV Profile 44 Configure a Subscribed Calendar Profile 45 Configure Web Clips Profile 45 Configure a SCEP/Credentials Profile 46 Configure a Global HTTP Proxy Profile 47 VMware, Inc.
    [Show full text]
  • Iphone Acquisition Using Jailbreaking Techniques
    Peter Varenkamp Peter 2019 thesis Master's NTNU Norwegian University of Science and Technology Faculty of Information Technology and Electrical Engineering Master's thesis Department of Information Security and Communication Technology May 2019 Jailbreaking Techniques iPhone AcquisitionUsing Peter Varenkamp iPhone Acquisition Using Jailbreaking Techniques MISEB Submission date: May 2019 Supervisor: Prof. Stefan Axelsson, IIK Co-supervisor: Police Superintendent Kurt H. Hansen (MSc), PHS Norwegian University of Science and Technology Department of Information Security and Communication Technology Acknowledgement I would like to thank my supervisors, Police Superintendent Kurt H. Hansen and Prof. Stefan Axelsson for their patience and engagement. Especial thanks to Police Superintendent Kurt H. Hansen, who has supported me since the spe- cialization course. P.V. Figure 1: Apple iPhone 1 Figure 2: Absinthe Jailbreak 2 1https://www.teltarif.de/img/jpg/smartphone/apple/iphone-x-1l.jpg 2https://cdn5-capriofiles.netdna-ssl.com/wp-content/uploads/2012/05/ greenpois0n-absinthe-.jpg Abstract Digital devices are a part of most peoples lives today. Using digital devices leaves traces. These traces can be urgent to solve a criminal case. Knowing this, forensic work has the goal to get as much data from a device as possible. Only physical image from a data storage is a 100% copy and can make sure that all data has been secured. Forensic work with digital evidence was in the first time done with opening a personal com- puter, removing the hard disk and secure with write protection. It was not so difficult to connect directly to the interface of the hard drive and performing a physical image.
    [Show full text]
  • CIS Apple Macos 10.12 Benchmark
    CIS Apple macOS 10.12 Benchmark v1.1.0 - 09-06-2018 Terms of Use Please see the below link for our current terms of use: https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/ 1 | P a g e Table of Contents Terms of Use ........................................................................................................................................................... 1 Overview .................................................................................................................................................................. 7 Intended Audience ........................................................................................................................................... 7 Consensus Guidance ........................................................................................................................................ 7 Typographical Conventions ......................................................................................................................... 8 Scoring Information ........................................................................................................................................ 8 Profile Definitions ............................................................................................................................................ 9 Acknowledgements ...................................................................................................................................... 10 Recommendations ............................................................................................................................................
    [Show full text]
  • Tinkertool System 6 Reference Manual Ii
    Documentation 0632-1969/2 TinkerTool System 6 Reference Manual ii Version 6.99, July 21, 2021. US-English edition. MBS Documentation 0632-1969/2 © Copyright 2003 – 2021 by Marcel Bresink Software-Systeme Marcel Bresink Software-Systeme Ringstr. 21 56630 Kretz Germany All rights reserved. No part of this publication may be redistributed, translated in other languages, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of the publisher. This publication may contain examples of data used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. The publisher may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Make sure that you are using the correct edition of the publication for the level of the product. The version number can be found at the top of this page. Apple, macOS, iCloud, and FireWire are registered trademarks of Apple Inc. Intel is a registered trademark of Intel Corporation. UNIX is a registered trademark of The Open Group. Broadcom is a registered trademark of Broadcom, Inc. Trademarks or service marks are used for identification purposes only.
    [Show full text]
  • Mac Os High Sierra App Store Background Download Question: Q: How to Download Full Installer of High Sierra
    mac os high sierra app store background download Question: Q: How to Download full installer of High sierra. i have Purchased macbook pro mid 2014 13" today. it currently have Mac Os X Yosemite .I want to download Mac Os High Sierra . When ever i tried to download it from app store, it just download a 19.9MB file instead of 4.80GB. i have 4 MacBooks. i want to download full installer and then make a bootable USB from it to update my all 4 MacBooks. what should i do? how can i download full installer . MacBook Pro with Retina display, OS X Yosemite (10.10.5), Macbook Pro Mid 2014 13" Download the New macOS High Sierra 10.13 Wallpaper for your Mac. Apart from the amazing hardware announcements at WWDC 2017, Apple unveiled a new operating system for Mac called macOS High Sierra. The new operating system comes with many performance improvements under-the-hood and new features, such as the Apple File System, support for HVEC format, better user privacy in Safari, and much more. As is the case with every new iteration of macOS, a new wallpaper was also added to macOS 10.13 that looks beautiful. Below is a preview of the macOS High Sierra wallpaper. To download it, click on the link below it and save to your desktop. The first beta version of macOS can be downloaded by developers via the software update mechanism in the Mac App Store or through the Apple Developer Center. The public beta will be released by the end of June, while the official release will be made later this year as a free software update from the MacApp Store.
    [Show full text]
  • 855400Cd46b6c9e7683b5ace58a55234.Pdf
    Ars TeAchrsn iTceachnica UK Register Log in ▼ ▼ Ars Technica has arrived in Europe. Check it out! × Encryption options are great, but Apple's attitude on checksums is still funky. by Adam H. Leventhal - Jun 26, 2016 1:00pm UTC KEEPING ON TRUCKING INDEPENDENCE, WHAT INDEPENDENCE? Two hours or so of WWDC keynoting and Tim Cook didn't mention a new file system once? Andrew Cunningham This article was originally published on Adam Leventhal's blog in multiple parts. Programmer Andrew Nõmm: "I had to be made Apple announced a new file system that will make its way into all of its OS variants (macOS, tvOS, iOS, an example of as a warning to all IT people." watchOS) in the coming years. Media coverage to this point has been mostly breathless elongations of Apple's developer documentation. With a dearth of detail I decided to attend the presentation and Q&A with the APFS team at WWDC. Dominic Giampaolo and Eric Tamura, two members of the APFS team, gave an overview to a packed room; along with other members of the team, they patiently answered questions later in the day. With those data points and some first-hand usage I wanted to provide an overview and analysis both as a user of Apple-ecosystem products and as a long-time operating system and file system developer. The overview is divided into several sections. I'd encourage you to jump around to topics of interest or skip right to the conclusion (or to the tweet summary). Highest praise goes to encryption; ire to data integrity.
    [Show full text]