A hash-based DOS attack on Btrfs
A hash-based DOS attack on Btrfs
Posted Dec 14, 2012 2:13 UTC (Fri) by cyanit (guest, #86671)In reply to: A hash-based DOS attack on Btrfs by wahern
Parent article: A hash-based DoS attack on Btrfs
Posted Dec 14, 2012 2:54 UTC (Fri)
by cyanit (guest, #86671)
[Link] (6 responses)
However, if other instructions can be scheduled by the out-of-order CPU in the meantime, then AES should be much faster, since the reciprocal throughput is actually 10 cycles on Sandy Bridge and should only take up one execution unit.
Without AES instructions things are most likely reversed.
Posted Dec 14, 2012 11:23 UTC (Fri)
by daniel (guest, #3181)
[Link] (4 responses)
Posted Dec 14, 2012 15:27 UTC (Fri)
by drag (guest, #31333)
[Link] (3 responses)
Posted Dec 15, 2012 2:11 UTC (Sat)
by daniel (guest, #3181)
[Link] (2 responses)
The most important result here is not the inappropriateness of CRC as a hash, but that Btrfs is a complex beast, still in development, a critical bug was just exposed, and likely a few more remain. Given wide enough testing and continued developer commitment it will become stable, but today it is not. From where I sit, it looks like Ext4 will be wearing its standard Linux filesystem crown for some time yet.
Posted Dec 15, 2012 6:17 UTC (Sat)
by SEJeff (guest, #51588)
[Link]
Posted Dec 15, 2012 13:18 UTC (Sat)
by vonbrand (subscriber, #4458)
[Link]
From a cursory look over, I'd say 220 *minutes* isn't just a bad hash degenerating to a linear search...
Posted Dec 15, 2012 2:46 UTC (Sat)
by wahern (subscriber, #37304)
[Link]
A hash-based DOS attack on Btrfs
A hash-based DOS attack on Btrfs
A hash-based DOS attack on Btrfs
A hash-based DOS attack on Btrfs
A hash-based DOS attack on Btrfs
A hash-based DOS attack on Btrfs
A hash-based DOS attack on Btrfs