Abstract:
Examples include compressed pages having data and compression metadata. Some examples include receiving a write request containing write data, storing the write data in data cache, and applying a page fit process to the write data. In some such examples, a virtual page table entry in a virtual page table may be generated for the processed write data. The virtual page table entry may include a compression index and a page address. An inline compression of the processed write data may be performed to compress and store the processed write data in a compressed page at a location associated with the compression index. In some examples, the compressed page may include a compression metadata having a reference count, a compressed page offset, and a virtual page address.
Abstract:
Examples include compressed pages having data and compression metadata. Some examples include receiving a write request containing write data, storing the write data in data cache, and applying a page fit process to the write data. In some such examples, a virtual page table entry in a virtual page table may be generated for the processed write data. The virtual page table entry may include a compression index and a page address. An inline compression of the processed write data may be performed to compress and store the processed write data in a compressed page at a location associated with the compression index. In some examples, the compressed page may include a compression metadata having a reference count, a compressed page offset, and a virtual page address.
Abstract:
Examples include repair of a volume while the volume is online. In some examples, a request is received to access a compressed page, wherein the compressed page includes compressed data and compression metadata, an error is identified in the compression metadata or the compressed data, and based on the error and the request, repair of the error is handled while the volume is online.
Abstract:
Disclosed herein are a system, non-transitory computer-readable medium, and method for maintaining storage unit transaction logs. Storage unit transaction logs received from controllers are separated.
Abstract:
Examples include a device for memory space management. Some examples include receiving, from a host, a space management request that identifies a virtual page address. The virtual page address may be associated with a compressed page that includes a compression metadata having a reference count that indicates a number of virtual pages of data in the compressed page. The virtual page table entry associated with the virtual page address in a virtual page table may be looked up. The virtual page table entry may identify the compressed page. In such examples, the virtual page table entry may be marked as invalid without updating the reference count in the compressed page. A determination may be made as to whether each virtual page table entry that identifies the compressed page is marked invalid. Based on the determination that each virtual page table entry that identifies the compressed page is invalid, a free space bitmap entry for the compressed page may be updated to indicate that the compressed page is free.
Abstract:
In example implementations, unreferenced memory addresses in a segment of a storage volume may be identified. Access to the segment of the storage volume may be controlled by one of a plurality of storage volume controllers (SVCs). The plurality of SVCs may control access to respective segments of the storage volume. Indicators of the identified unreferenced memory addresses may be stored in a volatile memory in the one of the plurality of SVCs. In response to an input/output (I/O) command from a host, data may be written to one of the identified unreferenced memory addresses corresponding to one of the indicators stored in the volatile memory. After the data has been written, the one of the indicators may be deleted from the volatile memory. The one of the identified unreferenced memory addresses may not have been made available to other SVCs after being identified.
Abstract:
Example implementations relate to determining lengths of acknowledgment delays for input/output (I/O) commands. In example implementations, a length of an acknowledgment delay for a respective I/O command may be based on cache availability, and activity level of a drive at which the respective I/O command is directed, after the respective I/O command has been executed. Acknowledgments for respective I/O commands may be transmitted after respective periods of time equal to respective lengths of acknowledgment delays have elapsed.
Abstract:
Techniques to copy data from a source region to a destination region, and to update in cache a source region timestamp and a destination region timestamp.
Abstract:
Example implementations relate to determining lengths of acknowledgment delays for input/output (I/O) commands. In example implementations, a length of an acknowledgment delay for a respective I/O command may be based on cache availability, and activity level of a drive at which the respective I/O command is directed, after the respective I/O command has been executed. Acknowledgments for respective I/O commands may be transmitted after respective periods of time equal to respective lengths of acknowledgment delays have elapsed.
Abstract:
Example implementations relate to data chunk storage. For example, an implementation includes an apparatus that includes a processor. The processor is to receive a first data chunk from a source device and to generate a first fingerprint of the first data chunk. In response to a determination that the first fingerprint matches a second fingerprint of a second data chunk, the processor is to select a storage pool from a plurality of storage pools at a storage device to store the first data chunk based on the first data chunk and based on the second data chunk. The plurality of storage pools includes a first storage pool associated with first particular data chunks with non-colliding fingerprints and a second storage pool associated with second particular data chunks with colliding fingerprints.