Proceedings of the 6th ACM &Amp; IEEE International Conference on Embedded Software - EMSOFT '06 2006
DOI: 10.1145/1176887.1176913
|View full text |Cite
|
Sign up to set email alerts
|

Reliability mechanisms for file systems using non-volatile memory as a metadata store

Abstract: Portable systems such as cell phones and portable media players commonly use non-volatile RAM (NVRAM) to hold all of their data and metadata, and larger systems can store metadata in NVRAM to increase file system performance by reducing synchronization and transfer overhead between disk and memory data structures. Unfortunately, wayward writes from buggy software and random bit flips may result in an unreliable persistent store. We introduce two orthogonal and complementary approaches to reliably storing file … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…A simple and common method to avoid protection issues is to mark pages as read-only while mapping them into virtual address space and marking only the pages to be updated as writable when a write is issued. One possible solution [43] is to explore a combination of the EVENODD error correction code algorithm and memory protection to improve the security of storage systems. In that solution, pages are locked for read-only purposes, and are only unlocked when a write is explicitly issued.…”
Section: ) Memory Protectionmentioning
confidence: 99%
“…A simple and common method to avoid protection issues is to mark pages as read-only while mapping them into virtual address space and marking only the pages to be updated as writable when a write is issued. One possible solution [43] is to explore a combination of the EVENODD error correction code algorithm and memory protection to improve the security of storage systems. In that solution, pages are locked for read-only purposes, and are only unlocked when a write is explicitly issued.…”
Section: ) Memory Protectionmentioning
confidence: 99%
“…All data must be copied for a migration because it is incompatible with other file system. In work [24], file system metadata is stored in MRAM in a special designed structure and layout to accelerate the performance. A similar work is done by using NVM and Flash memory store metadata and file data respectively [28].…”
Section: Related Workmentioning
confidence: 99%
“…In addition to providing on-demand error correction, RCFFS can also provide a consistency checker to correct permanent errors during system idle time [22,10]. Because the algebraic signature and Reed-Solomon code use the same underlying Galois field, the operations of taking the algebraic signature of a set of blocks and combining them via XOR or ReedSolomon commute: if f k (D0, D1, . .…”
Section: Reliabilitymentioning
confidence: 99%