Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems最新文献

筛选
英文 中文
Understanding configuration dependencies of file systems 了解文件系统的配置依赖关系
Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems Pub Date : 2022-06-27 DOI: 10.1145/3538643.3539756
Tabassum Mahmud, Duo Zhang, Om Rameshwar Gatla, Mai Zheng
{"title":"Understanding configuration dependencies of file systems","authors":"Tabassum Mahmud, Duo Zhang, Om Rameshwar Gatla, Mai Zheng","doi":"10.1145/3538643.3539756","DOIUrl":"https://doi.org/10.1145/3538643.3539756","url":null,"abstract":"File systems have many configuration parameters. Such flexibility comes at the price of additional complexity which could lead to subtle configuration-related issues. To address the challenge, we study the potential configuration dependencies of a representative file system (i.e., Ext4), and identify a prevalent pattern called multi-level configuration dependencies. We build a static analyzer to extract the dependencies and leverage the information to address different configuration issues. Our preliminary prototype is able to extract 64 multi-level dependencies with a low false positive rate. Additionally, we can identify multiple configuration issues effectively.","PeriodicalId":159120,"journal":{"name":"Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132369309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
What you can't forget: exploiting parallelism for zoned namespaces 您不能忘记的是:利用分区名称空间的并行性
Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems Pub Date : 2022-06-27 DOI: 10.1145/3538643.3539744
H. Bae, Jiseon Kim, Miryeong Kwon, Myoungsoo Jung
{"title":"What you can't forget: exploiting parallelism for zoned namespaces","authors":"H. Bae, Jiseon Kim, Miryeong Kwon, Myoungsoo Jung","doi":"10.1145/3538643.3539744","DOIUrl":"https://doi.org/10.1145/3538643.3539744","url":null,"abstract":"This paper discusses the main benefits of ZNS and shows why ZNS can be deprived of internal parallelism when downsizing its zone writable capacity. To this end, we use two production ZNS SSDs and quantitively analyze the performance degradation caused by inter-zone interference. We then suggest a simple mechanism to detect zone-to-zone relationships generating the interference and schedule I/O requests by being aware of internal parallelism. Our evaluation results using real production ZNS devices show that our mechanism can improve the bandwidth and latency of Linux's multi-queue I/O scheduler by 1.98 × and 2.2 ×, respectively.","PeriodicalId":159120,"journal":{"name":"Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124302290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Wear leveling in SSDs considered harmful 被认为有害的ssd损耗均衡
Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems Pub Date : 2022-06-27 DOI: 10.1145/3538643.3539750
Ziyang Jiao, J. Bhimani, B. Kim
{"title":"Wear leveling in SSDs considered harmful","authors":"Ziyang Jiao, J. Bhimani, B. Kim","doi":"10.1145/3538643.3539750","DOIUrl":"https://doi.org/10.1145/3538643.3539750","url":null,"abstract":"We argue that wear leveling in SSDs does more harm than good under modern settings where the endurance limit is in the hundreds. To support this claim, we evaluate existing wear leveling techniques and show that they exhibit anomalous behaviors and produce a high write amplification. These findings are consistent with a recent large-scale field study on the operational characteristics of SSDs. We discuss the option of forgoing wear leveling and instead adopting capacity variance in SSDs, and show that the capacity variance extends the lifetime of the SSD by up to 2.94×.","PeriodicalId":159120,"journal":{"name":"Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126800019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A principled approach for selecting block I/O traces 一种选择块I/O轨迹的原则性方法
Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems Pub Date : 2022-06-27 DOI: 10.1145/3538643.3539754
Omkar Desai, Seungmin Shin, Eunji Lee, B. Kim
{"title":"A principled approach for selecting block I/O traces","authors":"Omkar Desai, Seungmin Shin, Eunji Lee, B. Kim","doi":"10.1145/3538643.3539754","DOIUrl":"https://doi.org/10.1145/3538643.3539754","url":null,"abstract":"We present IOTAP, a tool that analyzes and profiles block I/O traces. IOTAP computes the (dis)similarities among a set of workloads and sets a guideline for selecting a subset of traces for benchmarking. By doing so, we avoid experimentally running all workloads or, even worse, arbitrarily selecting a subset that skews the results. We demonstrate the usefulness of IOTAP by comparing its results with experiments on real SSDs, achieving a high correlation of 0.92 for an NVMe SSD.","PeriodicalId":159120,"journal":{"name":"Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125095840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
When poll is more energy efficient than interrupt 当轮询比中断更节能时
Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems Pub Date : 2022-06-27 DOI: 10.1145/3538643.3539747
B. Harris, Nihat Altiparmak
{"title":"When poll is more energy efficient than interrupt","authors":"B. Harris, Nihat Altiparmak","doi":"10.1145/3538643.3539747","DOIUrl":"https://doi.org/10.1145/3538643.3539747","url":null,"abstract":"Polling is commonly indicated to be a more suitable IO completion mechanism than interrupt for ultra-low latency storage devices. However, polling's impact on overall energy efficiency has not been thoroughly investigated. In this paper, contrary to common belief, we show that polling can also be more energy efficient than interrupt. To do so, we systematically investigate the energy efficiency of all available Linux IO completion mechanisms, including interrupt, classic polling, and hybrid polling using a real ultra-low latency storage device, a power meter, and various workload behaviors. Our experimental results indicate that although hybrid polling provides a good trade-off in CPU utilization, it is the least energy efficient, whereas classic polling is the most energy efficient for low latency IO requests. To the best of our knowledge, this is the first paper classifying polling as more energy efficient than interrupt for a real secondary storage device, and we hope that our observations will lead to more energy efficient IO completion mechanisms for new generation storage device characteristics.","PeriodicalId":159120,"journal":{"name":"Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
When F2FS meets address remapping 当F2FS遇到地址重映射时
Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems Pub Date : 2022-06-27 DOI: 10.1145/3538643.3539755
Y. Lee, Jonghyeok Park, Jonggyu Park, Hyunho Gwak, Dongkun Shin, Y. Eom, Sang-Won Lee
{"title":"When F2FS meets address remapping","authors":"Y. Lee, Jonghyeok Park, Jonggyu Park, Hyunho Gwak, Dongkun Shin, Y. Eom, Sang-Won Lee","doi":"10.1145/3538643.3539755","DOIUrl":"https://doi.org/10.1145/3538643.3539755","url":null,"abstract":"While gaining popularity in mobile devices, F2FS, a flash-friendly variation of log-structured file system, reveals three drawbacks: segment cleaning overhead, metadata update overhead, and file fragmentation, which becomes conspicuous under random update workloads. This paper suggests for the first time to leverage the address-remap technique in flash storage to remedy such pitfalls in F2FS. Our approach can, while preserving the benefit of log-structured writes, achieve the eventual effect of in-place update, completely preventing three drawbacks of F2FS. It can thus significantly outperform ext4 as well as vanilla F2FS under random update workloads. Armed with another write mode, F2FS will become competitive for a wider range of applications.","PeriodicalId":159120,"journal":{"name":"Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115115691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compaction-aware zone allocation for LSM based key-value store on ZNS SSDs 在ZNS ssd上基于键值存储的LSM的紧凑感知区域分配
Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems Pub Date : 2022-06-27 DOI: 10.1145/3538643.3539743
Hee-Rock Lee, Chang-Gyu Lee, Seungjin Lee, Youngjae Kim
{"title":"Compaction-aware zone allocation for LSM based key-value store on ZNS SSDs","authors":"Hee-Rock Lee, Chang-Gyu Lee, Seungjin Lee, Youngjae Kim","doi":"10.1145/3538643.3539743","DOIUrl":"https://doi.org/10.1145/3538643.3539743","url":null,"abstract":"Unlike traditional block-based SSDs, Zoned Namespace (ZNS) SSDs expose storage through the zoned block interface, completely eliminating the need for in-device garbage collection (GC) and relinquishing this responsibility to applications. As a result, application-aware data placement decisions give the opportunity for applications on the host to perform efficient GC. Meanwhile, RocksDB for ZNS SSD places data with similar invalidation times (lifetimes) in the same zone through ZenFS (a user-level file system) using the Lifetime-based Zone Allocation algorithm (LIZA), and minimizes the GC overhead of valid data copy when reclaiming a zone. However, LIZA, which allocates zones by predicting the lifetime of each SSTable according to the level of the hierarchical structure of the LSM-tree, is very inefficient in minimizing the write amplification (WA) problem due to inaccurate predictions of SSTable lifetimes. Instead, based on our observation that the deletion time of SSTables in the LSM-tree is solely determined by the compaction process, we propose a novel Compaction-Aware Zone Allocation algorithm (CAZA) that allows the newly created SSTables to be deleted together after merging in the future. CAZA is implemented in RocksDB's ZenFS and our extensive evaluations show that CAZA significantly reduces the WA overhead compared to LIZA.","PeriodicalId":159120,"journal":{"name":"Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127729402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
PiF
Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems Pub Date : 2022-06-27 DOI: 10.1007/978-1-4020-6754-9_12859
Myungjun Chun, Jaeyong Lee, Sanggu Lee, Myung-Seok Kim, Jihong Kim
{"title":"PiF","authors":"Myungjun Chun, Jaeyong Lee, Sanggu Lee, Myung-Seok Kim, Jihong Kim","doi":"10.1007/978-1-4020-6754-9_12859","DOIUrl":"https://doi.org/10.1007/978-1-4020-6754-9_12859","url":null,"abstract":"","PeriodicalId":159120,"journal":{"name":"Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127846471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hello bytes, bye blocks: PCIe storage meets compute express link for memory expansion (CXL-SSD) Hello字节,bye块:PCIe存储满足内存扩展的计算express链路(CXL-SSD)
Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems Pub Date : 2022-06-27 DOI: 10.1145/3538643.3539745
Myoungsoo Jung
{"title":"Hello bytes, bye blocks: PCIe storage meets compute express link for memory expansion (CXL-SSD)","authors":"Myoungsoo Jung","doi":"10.1145/3538643.3539745","DOIUrl":"https://doi.org/10.1145/3538643.3539745","url":null,"abstract":"Compute express link (CXL) is the first open multi-protocol method to support cache coherent interconnect for different processors, accelerators, and memory device types. Even though CXL manages data coherency mainly between CPU memory spaces and memory on attached devices, we argue that it can also be useful to reform existing block storage as cost-efficient, large-scale working memory. Specifically, this paper examines three different sub-protocols of CXL from a memory expander viewpoint. It then suggests which device type can be the best option for PCIe storage to bridge its block semantics to memory-compatible, byte semantics. We then discuss how to integrate a storage-integrated memory expander into an existing system and speculate how much effect it does have on the system performance. Lastly, we visit various CXL network topologies and explore a new opportunity to efficiently manage the storage-integrated, CXL-based memory expansion.","PeriodicalId":159120,"journal":{"name":"Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126196195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Rethinking block storage encryption with virtual disks 重新思考虚拟磁盘块存储加密
Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems Pub Date : 2022-05-31 DOI: 10.1145/3538643.3539748
Danny Harnik, O. Naor, Effi Ofer, Or Ozery
{"title":"Rethinking block storage encryption with virtual disks","authors":"Danny Harnik, O. Naor, Effi Ofer, Or Ozery","doi":"10.1145/3538643.3539748","DOIUrl":"https://doi.org/10.1145/3538643.3539748","url":null,"abstract":"Disk encryption today uses standard encryption methods that are length preserving and do not require storing any additional information with an encrypted disk sector. This significantly simplifies disk encryption management as the disk mapping does not change with encryption. On the other hand, it forces the encryption to be deterministic when data is being overwritten and it disallows integrity mechanisms, thus lowering security guarantees. Moreover, because the most widely used standard encryption methods (like AES-XTS) work at small sub-blocks of no more than 32 bytes, deterministic overwrites form an even greater security risk. Overall, today's standard practice forfeits some security for ease of management and performance considerations. This shortcoming is further amplified in a virtual disk setting that supports versioning and snapshots so that overwritten data remains accessible. In this work, we address these concerns and stipulate that especially with virtual disks, there is motivation and potential to improve security at the expense of a small performance overhead. Specifically, adding per-sector metadata to a virtual disk allows running encryption with a random initialization vector (IV) as well as potentially adding integrity mechanisms. We explore how best to implement additional per-sector information in Ceph RBD, a popular open-source distributed block storage with client-side encryption. We implement and evaluate several approaches and show that one can run AES-XTS encryption with a random IV at a manageable overhead ranging from 1%--22%, depending on the IO size.","PeriodicalId":159120,"journal":{"name":"Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123676157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信