Clarity and Compromise First steps of DM/MD unification Neil Brown Kernel Engineer

Slides:



Advertisements
Similar presentations
What's new in OOo 2.3 Finn Blucher Project Support Engineer
Advertisements

December 29, 2013 Willem Bagchus Master CNE, CLP, MCP Senior SE, Senior Trainer GWAVA Reload.
Reduce Cost & Complexity Partner logo here Presenters Name (16pt) Presenters Title (14pt) Company/ (14pt) Manage and Deploy Applications using Virtualization.
Nsure ™ Audit Essentials Rick Meredith Software Engineer Novell, Inc. Jaime Brimhall Software Engineer Novell, Inc.
How to Successfully Cluster GroupWise Gregg A. Hinchman Consultant, Hinchman Consulting Ed Hanley Senior Consultant, Novell.
SAN Design Considerations Hylton Leigh Senior Consultant Novell Consulting, UK Stuart Thompson Senior Consultant Novell Consulting, UK.
How to Implement a Cluster of Clusters Atiq Adamjee Senior Architect Novell, Inc. Brad Rupp Software Engineer Novell, Inc.
Upgrading to Novell ® SecureLogin 3.5 Rod Tietjen,
DIR-835A1 Wireless N750 Dual-Band Router Wireless & Router Product Div. July 2011 D-Link WRPD.
August 20, 2006 Delivering Low Latency With IB SUSE ® Linux Enterprise Real Time Moiz Kohari Suse Labs Director Real-Time Systems.
Document Management with GroupWise ® Gregg Hinchman Consultant Hinchman Consulting Jerry Winkel Novell Escalation Engineer.
Nsure ™ Audit: Instrumenting Custom Applications Rick Meredith Jason Arrington Nsure Audit Engineering Novell, Inc.
Implementing Novell iChain ® at the City of Los Angeles Adam Loughran Senior Systems Engineer, Novell Robert Gillette IS Development Manager, City of Los.
Benefits of a SUSE ® Subscription Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
© Novell, Inc. All rights reserved. 1 Rethink Your Disaster Recovery Jason Dea Product Marketing Manager.
Configuring Identity Manager 2 (formerly DirXML ® ) for JDBC (w/DirXML) Jason Elsberry Software Engineer
Implementing DirXML ® Stylesheets David Wagstaff
Novell Nsure TM Identity Manager 2 andGroupWise Provisioning Art Purcell, GroupWise ® Engineering, David Holbrook, DirXML Engineering,
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
May 23, 2006 Open Source and the Public Sector Brian Fisher Linux Specialist Public Sector
Successful GroupWise Clustering, Part 1 Gregg A. Hinchman Ed Hanley Novell Inc.
April 30, 2007 openSUSE.org Build Service a short introduction Moiz Kohari VP Engineering.
The Art of Business Continuance Brad Rupp WG Storage Engineering Novell Gregg A. Hinchman Consultant Hinchman Consulting.
Novell ® BrainShare ® A Hands-on Approach to Implementing an Effective Retention Solution with Novell GroupWise and GWArchive Greg Smith, Director.
How to Successfully Cluster GroupWise ® Gregg A. Hinchman Consultant, Hinchman Consulting Ed Hanley Senior Consultant, Novell.
Kevin James Prototype Systems Devloper Novell Inc. Freddy Kaiser Technical Directory, Enterprise Solutions Novell Inc. BUS172 - Case Study: Extended Provisioning.
Retention for GroupWise Angela Williams - Channel Sales Manager Jeff Stratford - President Nexic, Inc.
Beginning Programming with the Novell GroupWise ® Object API Glade Monson Developer Services, Novell Inc.
January 8, 2009 Business Continuity Cluster Always Running Gregg A. Hinchman Consultant Hinchman Consulting
Strong Authentication to any Application Using SecureLogin and NMAS TM Scott Kiester and John Jolly Software Engineer Novell, Inc.
Securing GroupWise ® end-to-end with SSL Mike Bills ATT Engineer, Novell Inc.
Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc.
DIR-857 HD Media Router 3000 Sales Guide Wireless & Router Product Div. July 2011 D-Link WRPD.
Configuring Novell GroupWise ® on SuSE LINUX Randy Brown GroupWise Dedicated Support Engineer, Novell Inc. Matt Preston GroupWise Support.
May 1, 2007 Novell ® Infiniband and Virtualization VM -IB project Patrick Mullaney.
DIR-826L Wireless N600 Gigabit Cloud Router Sales Guide WRPD Jan 25 th, 2012 D-LINK HQ.
1 of 26 For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
가상화 기반의 Workload 관리솔루션 : FORGE PlateSpin Virtualization and Workload Management 나영관 한국노벨 /
SUSE ® Linux Enterprise High Availability Extension.
Introduction to GroupWise ® C3POs Glade Monson Developer Services, Novell Inc.
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Proprietary and Confidential. 1.
WorkloadIQ ™ The intelligent way to build, secure, manage and measure workloads across physical, virtual and cloud environments Your Name Here Your Title.
IDC Says, "Don't Move To The Cloud" Richard Whitehead Director, Intelligent Workload Management August, 2010 Ben Goodman Principal.
Novell ® IT Consulting Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
SUSE ® Linux Enterprise Desktop in a One-To-One 21st Century Classroom Alex Inman Director of Technology Whitfield School
Novell ® Technical Training Field / Sales Presentation Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Introduction to SUSE Studio Tim Serong Senior Clustering Engineer OPS Engineering, Novell Inc.
Patrick Hynes Solutions Director | Novell Endpoint Management | Overview of.... ZENworks 11.
OES11 / SLES11 Feature Competitive Novell Confidential.
GStreamer in OpenOffice.org? Cédric Bosdonnat, Radek Doulík.
Forrester and Novell Novell ® Identity Manager 4 Webcast I Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Novell ® VBA Interoperability roundup Noel Power OpenOffice developer
Novell ® Demo Systems Portal Update Doc Hodges Novell Demo Systems
DHP-600AV / DHP-601AV Powerline AV2 Gigabit Adapter Powerline AV2 Starter Kit Sales Guide WRPD, Mar 2013 D-Link Confidential.
From Source Code to Packages and even whole distributions By Cool Person From openSUSE.
UI-Facelift of the YaST Partitioner Module Martin Schmidkunz Arvin Schnell Katařina Machálková Status: 16th June 2008.
Enterprise Linux Servers Solution Overview Kerry Kim Enterprise Linux Servers Solution Manager.
From Source Code to Packages for Various Distributions Andreas Jaeger Program Manager openSUSE
UI-Facelift of the YaST Partitioner Module Martin Schmidkunz Status: 13th February 2008.
SUSE Studio: Building distributions By Cool Person From openSUSE.
The Community role in openSUSE life-cycle Dinar Valeev Community member.
From Source Code to Packages for Various Distributions
Redesign of AppArmor Modules in YaST
<Insert Picture Here>
Presentation transcript:

Clarity and Compromise First steps of DM/MD unification Neil Brown Kernel Engineer

Clarity, Compromise and Convergence. First steps of DM/MD unification Neil Brown Kernel Engineer

Clarity: Understand the differences

© Novell Inc. All rights reserved 4 Clarity 1: Different abstractions DM has 'targets', MD has 'block devices'. 'targets' are a DM-specific abstraction. – light weight - No 'baggage' like struct request_queue – Easy to disconnect/reconnect > 'struct inode' points directly to backing_dev_info in request_queue. – light weight – no plugging or congestion notification – no 'name' – for error messages or sysfs integration. A DM device is a 'table' of 'targets'.

© Novell Inc. All rights reserved 5 Clarity 2: Different configuration. DM uses extensible ioctl, MD uses sysfs (for extensions). – Both are textual, DM ioctls are positional. – DM has separate 'messages' for reconfiguration while active. – DM has two fixed-format status message (TABLE or INFO) – Change notification: > DM has blocking ioctl > MD uses select/poll. – Low level access: > DM: dmsetup > MD: cat / echo

© Novell Inc. All rights reserved 6 Clarity 3: Online reconfiguration. DM uses suspend / rebuild / resume – clean and general – requires target / block-device separation – non-atomic, so user-space must be careful not to allocate memory. MD uses hot-add, hot-remove, hot-grow. – needs kernel to know about every possible reconfiguration. – reconfiguration is easily atomic – probably more efficient for active reshape.

© Novell Inc. All rights reserved 7 Clarity 4: Mind Share MD is “RAID” even though it has non-RAID personalities like “multipath” and “faulty”. DM is “generic virtual block device” even though it imposes a “concatenation” mapping on top of everything.

Compromise: Work with the differences

© Novell Inc. All rights reserved 9 Compromise 1: MD RAID5 for DM Create a DM target by wrapping internals of md/raid5 – great learning exercise Ugly hacks for MD – Needed to make lots of sysfs code conditional Exposed weaknesses in DM (easily fixed) – No target access to plugging – No target access to congestion notification – Dirty-log had to align with target size, but need component size alignment.

© Novell Inc. All rights reserved 1010 Compromise 2: other possibilities. RAID0 is too simple to bother with RAID1 might be worth unifying multipath – DM is much more mature than MD. – also very different from any other DM or MD module. md/bitmap and dm-region-hash/dm-dirty-log have a lot in common....would need clarity on 'important' differences.

Convergence: Remove the differences

© Novell Inc. All rights reserved 1212 Convergence 1: The best of both worlds Create something new! – Neither DM nor MD is really suitable to completely incorporate the other. Compromise leads to kludges. Use a separate abstraction, like a 'dm-target'. – want something more light-weight than 'block_device' Use sysfs for all configuration/management. Provide legacy interface for both DM and MD.

© Novell Inc. All rights reserved 1313 Convergence 2: I have a dream.... New name for new abstraction: volumes Also have 'volume group' as a useful abstraction. A 'block device' volume simply wraps a block_device. A 'file' volume wraps a file (like loop) Other volumes are built from volumes in same group – built from one or more “volume + offset” – can do RAID or encrypt or concatenation or bcache or whatever – Possibly have 'dirty log' volumes and 'metadata' volumes. A volume group can present several block devices which can switch between volumes in the group.

© Novell Inc. All rights reserved 1414 Conclusions Convergence is hard work. – Need to understand the important differences. – Need to create a win-win situation. – Need a credible long term vision – Even then, no guarantees.

Questions?

Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.