摘要:
The invention is a storage device which implements a write barrier command and provides means for a host to designate other write commands as being sensitive or insensitive to the existence of write barrier commands. The device can optimize the execution of commands by changing the order of execution of write commands that are insensitive to write barrier command. In an embodiment of the invention a flag associated with the write command indicates whether the command is sensitive or insensitive to the existence of write barrier commands. In an embodiment of the invention the write barrier command can be implemented as a write command with a flag that indicates whether the command is a write barrier command. In one embodiment of the invention the queue of commands and data to be written to the media is stored in a non-volatile cache.
摘要:
Techniques for optimizing hard disk drive performance. According to one embodiment, a storage system includes a storage unit that stores data and a controller. The controller receives an idle mode indication and performs at least one operation based on the idle mode indication. According to another embodiment, a host system includes a processor and a scheduler that is operative to issues commands. The processor computes the idle mode indication, and the processor sends the idle mode indication to the storage system.
摘要:
A storage system that stores verify commands for all the write commands requiring verification in a verify-list that will be processed as a background task is described. The verify-list can include coded data fields that flexibly designate selected alternative states or possibilities for how and where the user data is actually stored. Alternatives for the verify-list include storing the actual raw data, no data, the data in compressed form, a CRC type signature of the data and/or a pointer to a backup copy of the data that is stored either in non-volatile memory such as flash memory or on the disk media in a temporary area. In case of a verification error in various alternative embodiments the user data can be recovered using the backup copy in the verify-list in the write cache, the backup copy in flash memory or on the disk, or from the host.
摘要:
A disk drive that includes nonvolatile memory monitors the drive's reliability-related parameters to detect real or potential failure events, and records failure-related data in nonvolatile memory, rather than in reserved areas of the disks. The monitoring may be by running a diagnostic routine or by regular or periodic monitoring of disk drive sensors, like temperature and shock sensors. The failure events to be monitored and recorded may include defective data sectors. When a new defective sector is detected after the disk drive has been put into operation, that defective sector is taken out of service and its logical block address (LBA) is mapped to a memory space in the nonvolatile memory rather to a reserved spare sector on the disk. When a read or write command is received for an LBA range that includes the defective sector's LBA, the defective sector is skipped while the whole LBA range of the command is processed and the user data for the defective sector's LBA is read from or written to the mapped memory space in the nonvolatile memory.
摘要:
A storage system according to the invention maintains an arithmetic signature or fingerprint generated using the content of selected units of data stored on the media. The signature is stored in metadata in non-volatile storage on the system's electronics card preferably in a tamper resistant module (TRM). When reading a data unit from storage, the system uses the saved signature to verify that the data unit has not been altered by unauthorized means after it was stored. The content of the stored data is thereby bound to the metadata stored in the system's non-volatile storage so that by-passing or physically separating the bulk storage media (e.g. disks) from the system's electronics will not allow alteration of the data without detection. The method also prevents unauthorized data roll-back because the signature of old data will not match the current signature in the metadata.
摘要:
A data storage device encrypts data stored in non-volatile memory using a bulk encryption key. The data storage device uses a key derivation function to generate an initial encryption key. The data storage device then wraps an intermediate encryption key with the initial encryption key and stores the wrapped intermediate key in the non-volatile memory. The data storage device wraps the bulk encryption key with the intermediate encryption key and stores the wrapped bulk encryption key in the non-volatile memory. The data storage device can unwrap the wrapped intermediate key to generate the intermediate encryption key using the initial encryption key. The data storage device can unwrap the wrapped bulk encryption key to generate the bulk encryption key using the intermediate encryption key. The data storage device decrypts data stored in the non-volatile memory using the bulk encryption key.
摘要:
A hybrid disk drive, i.e., a disk drive with two types of permanent storage media (conventional disk media and nonvolatile memory, such as flash memory), uses its nonvolatile memory in operational modes other than the power-save or “standby” mode wherein the disks are spun down. In a first additional mode, called a “performance” mode, one or more blocks of write data are destaged from volatile memory (the disk drive's write cache) and written to the disk and simultaneously one or more data blocks of write data are destaged from the volatile memory and written to the nonvolatile memory. In a second additional mode, called a “harsh-environment” mode, the disk drive includes one or more environmental sensors, such as temperature and humidity sensors, and the nonvolatile memory temporarily replaces the disks as the permanent storage media. In a third additional mode, called a “write-inhibit” mode, the disk drive includes one or more write-inhibit detectors, such as a shock sensor for detecting disturbances and vibrations to the disk drive. In write-inhibit mode, if the write-inhibit signal is on then the write data is written from the volatile memory to the nonvolatile memory instead of to the disks.
摘要:
A verifiable security mode is provided for securing data on a storage device, such as a hard disk drive. When the verifiable security mode is enabled, only authenticated accesses to data stored on the storage device are permitted after entering a password. An end user is prevented from disabling the verifiable security mode. The verifiable security mode can be set to allow or disallow an administrator from disabling the verifiable security mode. The verifiable security mode can be implemented, for example, in firmware on a hard disk drive (HDD).
摘要:
Enhancements to the functionality of a file system are provided. A file system can provide an additional level of error correction, in addition to the error correction provided by a data storage device. An extension to the metadata area in a file system can store index information about data files that the file system can use to reduce the time it takes to access the files. A file system can use extended metadata to store conditional access information for data files stored in the file system. A data storage device can also examine and characterize the data being stored in order to categorize a user's files automatically. Modules can be loaded into a file system to provide new functionality to the file system. The modules can load additional modules to extend their functionality.