-
公开(公告)号:US20220414064A1
公开(公告)日:2022-12-29
申请号:US17357044
申请日:2021-06-24
Applicant: VMware, Inc.
Inventor: Abhay Kumar JAIN , Sriram PATIL , Junlong GAO , Wenguang WANG
IPC: G06F16/182 , G06F16/17 , G06F16/16 , G06F16/178 , G06F16/174
Abstract: A method for managing replication of cloned files is provided. Embodiments include determining, at a source system, that a first file has been cloned to create a second file. Embodiments include sending, from the source system to a replica system, an address of the first extent and an indication that a status of the first extent has changed from non-cloned to cloned. Embodiments include changing, at the replica system, a status of a second extent associated with a replica of the first file on the replica system from non-cloned to cloned and creating a mapping of the address of the first extent to an address of the second extent on the replica system. Embodiments include creating, at the replica system, a replica of the second file comprising a reference to the address of the second extent on the replica system.
-
公开(公告)号:US20230004525A1
公开(公告)日:2023-01-05
申请号:US17367233
申请日:2021-07-02
Applicant: VMware, Inc.
Inventor: Asit DESAI , Abhay Kumar JAIN , Wenguang WANG , Eric KNAUFT , Enning XIANG
Abstract: An example method of upgrading a distributed storage object from a first version to a second version includes: querying metadata of a first component configured according to the first version of the distributed storage object, the metadata defining extents of data on a disk group of the first component; populating, for a second component configured according to the second version of the distributed storage object, logical and middle maps based on the metadata such that initial entries in the logical map point to initial entries in the middle map, and the initial entries in the middle map point to physical addresses of the disk group of the first component; and reading the data from the disk group of the first component and writing the data to a disk group of the second component while updating the initial entries in the middle map.
-
公开(公告)号:US20250028679A1
公开(公告)日:2025-01-23
申请号:US18356129
申请日:2023-07-20
Applicant: VMware, Inc.
Inventor: Maxime AUSTRUY , Eric KNAUFT , Sriram PATIL , Abhay Kumar JAIN , Wenguang WANG
Abstract: An example method of managing a log-structured file system (LFS) on a storage device includes: receiving, at storage software executing on a host, an operation that overwrites a data block, the data block included in a segment of the LFS; determining from first metadata stored on the storage device, a change in utilization of the segment from a first utilization value to a second utilization value; modifying second metadata stored on the storage device to change a relation between the segment and a first bucket to be a relation between the segment and a second bucket, the first utilization value included in a range of the first bucket and the second utilization value included in a range of the second bucket; and executing a garbage collection process for the LFS that uses the second metadata to identify for garbage collection a set of segments in the second bucket.
-
公开(公告)号:US20240111722A1
公开(公告)日:2024-04-04
申请号:US18057384
申请日:2022-11-21
Applicant: VMware, Inc.
Inventor: Xiaohua FAN , Zhaohui GUO , Wenguang WANG , Kiran PATIL , Abhay Kumar JAIN
IPC: G06F16/16 , G06F16/185 , G06F16/188
CPC classification number: G06F16/162 , G06F16/185 , G06F16/188
Abstract: Deleting directories in a virtual distributed file system (VDFS), and non-virtual file systems, involves changing the name of a selected directory to a unique object identifier (UID) and moving the selected directory, named according to the UID, to a deletion target directory. A recursive process, implemented using a background deletion thread, starts in the current directory and identifies objects in the current directory. For an object that is a file or an empty directory, the object is added to a deletion queue. For an object that is a directory that is not empty, the recursion drops down into that directory as the new current directory. When the recursion has exhausted the selected directory, or some maximum object count has been reached, the objects identified in the deletion queue are deleted. This approach can also be used for file operations other than deletion, such as compression, encryption, and hashing.
-
5.
公开(公告)号:US20230221864A1
公开(公告)日:2023-07-13
申请号:US17647530
申请日:2022-01-10
Applicant: VMware, Inc.
Inventor: Abhay Kumar JAIN , Wenguang WANG
IPC: G06F3/06
CPC classification number: G06F3/0608 , G06F3/0652 , G06F3/0679
Abstract: A method for inline block-level deduplication is provided. The method generally includes receiving an input/output (I/O) to write a first data block in storage as associated with an logical block address (LBA), hashing the first data block to a first hash, determining a match for the first hash is contained in a bloom filter based on set bits in the bloom filter for the first hash, determining an entry for the first data block is contained in a deduplication hash table based on a subset of bits of the first hash, locating a first middle map extent in a middle map based on a middle block address (MBA) included in the entry, verifying the first hash matches the first hash stored in the middle map extent, adding a logical map extent for the LBA to a logical map, wherein the logical map extent maps the LBA to the MBA.
-
公开(公告)号:US20220292061A1
公开(公告)日:2022-09-15
申请号:US17202342
申请日:2021-03-15
Applicant: VMware, Inc.
Inventor: Abhay Kumar JAIN , Wenguang WANG , Richard P. SPILLANE
Abstract: Optimizing file access includes a process for identifying a file access event for a first accessed file, and incrementing a first access counter in an access list in a memory, which also includes access counters for other accessed files. The process further includes exporting the first access counter to a performance monitoring dashboard, or exporting to a storage allocator and, based on the value, moving the first accessed file between a first storage and a second storage. The process also includes determining whether the value of the first access counter meets a first threshold, or a sum of values of the access counters for the other accessed files meets a second threshold. Based on meeting the first threshold or meeting the second threshold, the process includes persisting the access counters on a storage media. The access counters also provide security monitoring (e.g., identifying excessive file access).
-
公开(公告)号:US20240419350A1
公开(公告)日:2024-12-19
申请号:US18334231
申请日:2023-06-13
Applicant: VMware, Inc.
Inventor: Abhay Kumar JAIN , Wenguang WANG , Enning XIANG
Abstract: Chunks of data are identified and deduplication is performed on the chunks of data using associated cyclic redundancy check (CRC) values. A plurality of CRC values is obtained that is associated with consecutive data blocks stored in a payload data store. Cut point CRC values are identified in the plurality of CRC values and CRC chunks are identified based on those cut point CRC values, wherein each CRC chunk is bounded by two consecutive cut point CRC values. A CRC chunk hash value is generated for each CRC chunk. A pair of duplicate CRC chunks is identified using the CRC chunk hash values and a deduplication operation is performed in association with the identified pair of duplicate CRC chunks. Using existing CRC values during the identification of chunk cut points reduces the computing resource costs associated with performing that process using the data blocks.
-
公开(公告)号:US20230123478A1
公开(公告)日:2023-04-20
申请号:US17504845
申请日:2021-10-19
Applicant: VMware, Inc.
Inventor: Enning XIANG , Wenguang WANG , Abhay Kumar JAIN , Sriram PATIL , Asit DESAI , Eric KNAUFT
IPC: G06F16/11 , G06F16/182 , G06F16/22 , G06F12/02
Abstract: Example methods and systems for accessing data in a log-structured file system having a plurality of snapshots of storage objects backed by a first-level copy-on-write (COW) B+ tree data structure and a plurality of second-level B+ tree data structures have been disclosed. One example method includes obtaining a first first-level mapping associated with a first snapshot from the plurality of snapshots based on a first logical block address, wherein each of the plurality of snapshots corresponds to each of the plurality of second-level B+ tree data structures, identifying a first second-level B+ tree data structure corresponding to one of the plurality of snapshots based on the first first-level mapping, obtaining a first second-level mapping based on the first logical block address in the first second-level B+ tree data structure, obtaining a first physical block address based on the first second-level mapping, and accessing data at the first physical block address.
-
公开(公告)号:US20210141728A1
公开(公告)日:2021-05-13
申请号:US16679570
申请日:2019-11-11
Applicant: VMware, Inc.
Inventor: Wenguang WANG , Mounesh BADIGER , Abhay Kumar JAIN , Junlong GAO , Zhaohui GUO , Richard P. SPILLANE
IPC: G06F12/0842 , G06F12/0844 , G06F12/0871 , G06F12/1018 , G06F12/14
Abstract: Disclosed are a method and system for managing multi-threaded concurrent access to a cache data structure. The cache data structure includes a hash table and three queues. The hash table includes a list of elements for each hash bucket with each hash bucket containing a mutex object and elements in each of the queues containing lock objects. Multiple threads can each lock a different hash bucket to have access to the list, and multiple threads can each lock a different element in the queues. The locks permit highly concurrent access to the cache data structure without conflict. Also, atomic operations are used to obtain pointers to elements in the queues so that a thread can safely advance each pointer. Race conditions that are encountered with locking an element in the queues or entering an element into the hash table are detected, and the operation encountering the race condition is retried.
-
-
-
-
-
-
-
-