2015
DOI: 10.1145/2872887.2750420
|View full text |Cite
|
Sign up to set email alerts
|

Unified address translation for memory-mapped SSDs with FlashMap

Abstract: Applications can map data on SSDs into virtual memory to transparently scale beyond DRAM capacity, permitting them to leverage high SSD capacities with few code changes. Obtaining good performance for memory-mapped SSD content, however, is hard because the virtual memory layer, the file system and the flash translation layer (FTL) perform address translations, sanity and permission checks independently from each other. We introduce FlashMap, an SSD interface that is optimized for memory-mapped SSD-files. Flash… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 29 publications
(29 reference statements)
0
13
0
Order By: Relevance
“…Secure Storage Systems. System and architecture community have been working on flash-based storage [17,28,29,59,75], However, most focused on performance rather than security. Similarly, hardware researchers have focused on increasing storage capacity and performance [25,29,42], few of them considered security in their design.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Secure Storage Systems. System and architecture community have been working on flash-based storage [17,28,29,59,75], However, most focused on performance rather than security. Similarly, hardware researchers have focused on increasing storage capacity and performance [25,29,42], few of them considered security in their design.…”
Section: Related Workmentioning
confidence: 99%
“…System and architecture community have been working on flash-based storage [17,28,29,59,75], However, most focused on performance rather than security. Similarly, hardware researchers have focused on increasing storage capacity and performance [25,29,42], few of them considered security in their design. Although we have deployed flash-based storage devices on various computing platforms [32,71], none of the released products claimed they can defend against ransomware attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Note that the system overhead imposed by MMF (mmap and I/O stack) accounts for 69% of the total execution time. This is because MMF is involved in many software operations including multiple page fault handling, context switches, address translations (i.e., page table, filesystem and FTL), boundary checks, and permission checks [20]. The context switches are one of the main contributors to increase I/O latency [40].…”
Section: B Software-based Memory Expansionmentioning
confidence: 99%
“…On the other hand, the queuing mechanism and NVMe communication protocol in I/O stack are optimized for throughput rather than I/O latency [68]. The software operations of MMF consume 15∼20 us [20], which is around 6× longer than ZNAND access latency (3 us).…”
Section: B Software-based Memory Expansionmentioning
confidence: 99%
“…The page fault handler obtains a free volatile page from the physical memory manager 5 and maps its physical address to the faulting virtual address referenced by the application using a kernel driver for managing application page table in software [34,41]. In case the free list is empty, PolyEMT evicts a page 6 .…”
Section: Prototyping Polyemtmentioning
confidence: 99%