Abstract:
A trim management method for a storage device includes activating, by a processor configured by an application program, a pattern check function of a device driver, requesting, by the processor configured by the application program, a file system to write a file of a specified pattern, converting, by the processor configured by the file system, the file to management unit data of the storage device, transmitting, by the processor configured by the file system, the management unit data to the device driver, checking, by the processor configured by the device driver, whether a data pattern of the management unit data is the same as the specified pattern, and transmitting, by the processor configured by the device driver, a trim command for trimming a storage area corresponding to the management unit data, to the storage device based on results of the checking.
Abstract:
A data storage device and a method for operating the data storage device are disclosed. The data storage device may include an interface receiving a command and data from a host, a cache temporarily storing the received data, a memory non-temporarily storing the data stored in the cache, and a controller controlling the memory and the cache based on the command received from the host. The command may include charge rate of a battery supplying a power to the data storage device. The controller may determine whether or not the data storage device is an idle state, and determine an active operation mode of the data storage device based on the charge rate of the battery, when the data storage device is the idle state.
Abstract:
A method of operating a host controlling a storage medium includes receiving initial authentication information; setting a portion of a storage space of the storage medium as a protection area; transmitting the received initial authentication information and protection area information with respect to the protection area to the storage medium; and discarding the initial authentication information in the host.
Abstract:
A computer system includes a host and a storage device. The host provides an input/output request (IO request). The storage device receives the request from the host and sends an interrupt informing input/output completion (IO completion) to the host after completing the IO request. The host adjusts the number of generated interrupts of the storage device using the number of delayed IOs. The computer system may adaptively control interrupt generation of the storage device based on a load status of a CPU or the number of delayed IOs. The interrupt generation of the storage device may be adjusted to obtain a CPU gain without loss of performance or processing time of the computer system.
Abstract:
Embodiments of the inventive concept include computer-implemented method for shadowing one or more boot images of a mobile device. The technique can include duplicating boot images to shadow partitions in a user area of a non-volatile memory device such as a flash memory. The technique can include detecting boot image corruption, and causing a mobile device to boot from the shadow partitions. The technique can include dynamically shadowing and releasing blocks used by the shadow partitions. The technique can include boot failure recovery and bad image preservation through firmware flash translation layer (FTL) logical to physical mapping updates. Boot image corruption failures can be recovered from and/or debugged using the shadow partitions.