* xfs over thin provisioning talk @ 2013-12-02 16:56 Carlos Maiolino 2013-12-04 3:23 ` Theodore Ts'o 0 siblings, 1 reply; 3+ messages in thread From: Carlos Maiolino @ 2013-12-02 16:56 UTC (permalink / raw) To: linux-ext4 Hi guys, Lukas told me that some guys here might be interested in a talk I did at LPC 2013 about XFS using dm-thin module. For those interested, the slides can be downloaded here: http://people.redhat.com/~cmaiolin/talks/XFS-dmthin.pdf cheers -- Carlos ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: xfs over thin provisioning talk 2013-12-02 16:56 xfs over thin provisioning talk Carlos Maiolino @ 2013-12-04 3:23 ` Theodore Ts'o 2013-12-06 12:45 ` Carlos Maiolino 0 siblings, 1 reply; 3+ messages in thread From: Theodore Ts'o @ 2013-12-04 3:23 UTC (permalink / raw) To: linux-ext4 On Mon, Dec 02, 2013 at 02:56:12PM -0200, Carlos Maiolino wrote: > Hi guys, > > Lukas told me that some guys here might be interested in a talk I did at LPC > 2013 about XFS using dm-thin module. > > For those interested, the slides can be downloaded here: > http://people.redhat.com/~cmaiolin/talks/XFS-dmthin.pdf Hi Carlos, Thanks for sending these slides. They are very interesting indeed. Lukas mentioned that you had run some tests using ext4 and it didn't do well at all using dm-thin? Given that we're not doing proper raid strip alignment in our allocation decisions, that's not too surprising, but it would be useful if there are other things that we should do in order to do a better job working with dm-thin drives. One other question --- in your conclusion you say: Bypassing block zeroing while provisioning blocks adds a significant boost to the dm-thin performance, but, it can induce a security breach, at the risk of exposing stale data This might be true if you are directly giving dm-thin volumes to mutually suspicious VM's with different trust boundaries. But if you trust the file system, and the dm-thin devices are mediated by the a file system running in the same context as the dm-thin volumes, there wouldn't be any security issue, correct? Cheers, - Ted ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: xfs over thin provisioning talk 2013-12-04 3:23 ` Theodore Ts'o @ 2013-12-06 12:45 ` Carlos Maiolino 0 siblings, 0 replies; 3+ messages in thread From: Carlos Maiolino @ 2013-12-06 12:45 UTC (permalink / raw) To: linux-ext4 Hi Ted. > > For those interested, the slides can be downloaded here: > > http://people.redhat.com/~cmaiolin/talks/XFS-dmthin.pdf > > Hi Carlos, > > Thanks for sending these slides. They are very interesting indeed. > > Lukas mentioned that you had run some tests using ext4 and it didn't > do well at all using dm-thin? Given that we're not doing proper raid > strip alignment in our allocation decisions, that's not too > surprising, but it would be useful if there are other things that we > should do in order to do a better job working with dm-thin drives. > Ted, my apologies, when I ran the tests over ext4, I didn't save the results since I wasn't going to compare ext4 and xfs, and I really didn't think about it might be useful. > One other question --- in your conclusion you say: > > Bypassing block zeroing while provisioning blocks adds a significant > boost to the dm-thin performance, but, it can induce a security > breach, at the risk of exposing stale data > > This might be true if you are directly giving dm-thin volumes to > mutually suspicious VM's with different trust boundaries. But if you > trust the file system, and the dm-thin devices are mediated by the a > file system running in the same context as the dm-thin volumes, there > wouldn't be any security issue, correct? > Yes, you're correct, if you trust who is using the block device and it's not 'public' like you said (a block device given to a VM, like a public VM host , amazon for example), there is no security issue. Although, dm-thin should have an algorithm to bypass the block device zeroing step in case you're writing a whole block. But, at the time of my talk, it was buggy :) > Cheers, > > - Ted > -- > To unsubscribe from this list: send the line "unsubscribe linux-ext4" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html -- Carlos ^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2013-12-06 12:45 UTC | newest] Thread overview: 3+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2013-12-02 16:56 xfs over thin provisioning talk Carlos Maiolino 2013-12-04 3:23 ` Theodore Ts'o 2013-12-06 12:45 ` Carlos Maiolino
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).