File system bugs that corrupt file system metadata on disk are insidious. Existing file-system reliability methods, such as checksums, redundancy, or transactional updates, merely ensure that the corruption is reliably preserved. The typical workarounds, based on using backups or re-pairing the file system, are painfully slow. Worse, the re-covery is performed long after the original error occurred and thus may result in further corruption and data loss. We present a system called Recon that protects file sys-tem metadata from buggy file system operations. Our ap-proach leverages modern file systems that provide crash consistency using transactional updates. We define declar-ative statements called consistency invariants for a file system. ...
Portable systems such as cell phones and portable media players commonly use non-volatile RAM (NVRAM...
We present the design, implementation, and evaluation of a file system mechanism that protects the i...
As we’ve seen thus far, the file system manages a set of data struc-tures to implement the expected ...
File system bugs that corrupt file system metadata on disk are insidious. Existing file-system relia...
Existing file-system reliability methods, such as checksums, redundancy, or transactional updates, p...
File Systems today have grown from a minimal software to a sophisticated system code that is much ro...
Data corruption is the most common consequence of file-system bugs, as shown by a recent study. When...
A runtime file system checker protects file-system metadata integrity. It checks the consistency of ...
We present the first comprehensive study of application-level crash-consistency protocols built atop...
This thesis describes how we use run-time invariant checking to protect data from corruption origina...
This paper shows how to use model checking to find serious errors in file systems. Model checking is...
Reliable storage systems depend in part on “write-before ” relationships where some changes to stabl...
File system consistency frequently involves a choice between raw performance and integrity guarantee...
Crash failures, hardware errors, and file system bugs can corrupt file systems and cause data loss, ...
The data contents of an information system may be corrupted due to human errors, malicious attacks o...
Portable systems such as cell phones and portable media players commonly use non-volatile RAM (NVRAM...
We present the design, implementation, and evaluation of a file system mechanism that protects the i...
As we’ve seen thus far, the file system manages a set of data struc-tures to implement the expected ...
File system bugs that corrupt file system metadata on disk are insidious. Existing file-system relia...
Existing file-system reliability methods, such as checksums, redundancy, or transactional updates, p...
File Systems today have grown from a minimal software to a sophisticated system code that is much ro...
Data corruption is the most common consequence of file-system bugs, as shown by a recent study. When...
A runtime file system checker protects file-system metadata integrity. It checks the consistency of ...
We present the first comprehensive study of application-level crash-consistency protocols built atop...
This thesis describes how we use run-time invariant checking to protect data from corruption origina...
This paper shows how to use model checking to find serious errors in file systems. Model checking is...
Reliable storage systems depend in part on “write-before ” relationships where some changes to stabl...
File system consistency frequently involves a choice between raw performance and integrity guarantee...
Crash failures, hardware errors, and file system bugs can corrupt file systems and cause data loss, ...
The data contents of an information system may be corrupted due to human errors, malicious attacks o...
Portable systems such as cell phones and portable media players commonly use non-volatile RAM (NVRAM...
We present the design, implementation, and evaluation of a file system mechanism that protects the i...
As we’ve seen thus far, the file system manages a set of data struc-tures to implement the expected ...