Go to file
Michal Mielewczyk 641902fb90 Implement synchronization primitives destroyers.
Signed-off-by: Michal Mielewczyk <michal.mielewczyk@intel.com>
2019-08-19 02:34:54 -04:00
casadm Use name based OCF management API 2019-08-16 14:08:34 +02:00
configure.d Init SCSI request properly on newer kernels 2019-08-05 11:51:17 +02:00
modules Implement synchronization primitives destroyers. 2019-08-19 02:34:54 -04:00
ocf@8ed525ae7f Implement synchronization primitives destroyers. 2019-08-19 02:34:54 -04:00
test Extend smoke tests set 2019-07-15 06:32:10 -04:00
utils Merge pull request #73 from Ostrokrzew/changed 2019-08-05 13:37:19 +02:00
.gitignore Extending 'configure' script 2019-05-30 06:29:07 -04:00
.gitmodules Change ocf submodule path to https 2019-05-09 12:42:45 +02:00
.pep8speaks.yml Add pep8speaks custom config 2019-07-30 08:42:12 +02:00
configure configure: Prevent spawning more subprocesses than CPUs available. 2019-08-02 01:00:34 -04:00
LICENSE Add LICENSE file 2019-03-29 09:45:21 +01:00
Makefile Initial commit 2019-03-29 08:45:50 +01:00
README.md Add info about security vulnerabilities 2019-05-29 10:38:29 +02:00

Open CAS Linux

Open CAS accelerates Linux applications by caching active (hot) data to a local flash device inside servers. Open CAS implements caching at the server level, utilizing local high-performance flash media as the cache drive media inside the application server as close as possible to the CPU, thus reducing storage latency as much as possible. The Open Cache Acceleration Software installs into the GNU/Linux operating system itself, as a kernel module. The nature of the integration provides a cache solution that is transparent to users and applications, and your existing storage infrastructure. No storage migration effort or application changes are required.

Open CAS is distributed on BSD-3-Clause license (see https://opensource.org/licenses/BSD-3-Clause for full license texts).

Open CAS uses Safe string library (safeclib) that is MIT licensed.

Security

To report a potential security vulnerability please follow the instructions here.