-
公开(公告)号:US11907161B2
公开(公告)日:2024-02-20
申请号:US17367233
申请日:2021-07-02
Applicant: VMware, Inc.
Inventor: Asit Desai , Abhay Kumar Jain , Wenguang Wang , Eric Knauft , Enning Xiang
CPC classification number: G06F16/122 , G06F3/0604 , G06F3/067 , G06F3/0659 , G06F3/0664 , G06F12/10 , G06F16/148
Abstract: An example method of upgrading a distributed storage object from a first version to a second version includes: querying metadata of a first component configured according to the first version of the distributed storage object, the metadata defining extents of data on a disk group of the first component; populating, for a second component configured according to the second version of the distributed storage object, logical and middle maps based on the metadata such that initial entries in the logical map point to initial entries in the middle map, and the initial entries in the middle map point to physical addresses of the disk group of the first component; and reading the data from the disk group of the first component and writing the data to a disk group of the second component while updating the initial entries in the middle map.
-
公开(公告)号:US11841826B2
公开(公告)日:2023-12-12
申请号:US17960023
申请日:2022-10-04
Applicant: VMware, Inc.
Inventor: Sriram Patil , Abhay Kumar Jain , Wenguang Wang , Nitin Rastogi , Pranay Singh , Richard P. Spillane
IPC: G06F17/00 , G06F7/00 , G06F16/11 , G06F16/185 , G06F16/174
CPC classification number: G06F16/128 , G06F16/1748 , G06F16/185
Abstract: Techniques for efficiently managing a file clone from a filesystem which supports efficient volume snapshots are provided. In some embodiments, a system may receive an instruction to remove the file clone from the filesystem. The file clone may be a point-in-time copy of metadata of an original file. The system may further—for a file map entry in a filesystem tree associated with the file clone, the file map entry indicating a data block—decrement a reference count in a reference count entry associated with the file map entry. The reference count entry may be stored in the filesystem tree according to a key and the key may comprise an identification of the original file. The system may further reclaim the data block in a storage system when the reference count is zero.
-
公开(公告)号:US11360678B1
公开(公告)日:2022-06-14
申请号:US17179977
申请日:2021-02-19
Applicant: VMware, Inc.
Inventor: Long Yang , Wenguang Wang , Pranay Singh , Abhay Kumar Jain
IPC: G06F3/06
Abstract: In one set of embodiments, a computer system can periodically run an unmap service configured to scan a subset of bitmaps maintained by a file system of the computer system. As part of scanning each bitmap in the subset, the unmap service can, for each bit in the bitmap: (1) check whether the bit indicates that a corresponding physical block address (PBA) on the storage backend is currently free; (2) upon determining that the bit indicates the PBA is currently free, identify an extent within the bitmap where the PBA resides; (3) check whether an unmap indicator associated with the extent indicates that at least one free PBA in the extent is not currently unmapped in the storage backend; and (4) upon determining that the unmap indicator indicates at least one free PBA in the extent is not currently unmapped in the storage backend, add the PBA to a list of PBAs to be unmapped.
-
公开(公告)号:US20220004461A1
公开(公告)日:2022-01-06
申请号:US16920490
申请日:2020-07-03
Applicant: VMware, Inc.
Inventor: Abhay Kumar Jain , Wenguang Wang
IPC: G06F11/14 , G06F16/11 , G06F16/16 , G06F16/18 , G06F16/174
Abstract: Techniques for efficiently exporting snapshot changes are provided. In some embodiments, a system may receive a first snapshot of a data set in a storage system and a second snapshot the data set in the storage system. The system may further generate actions based on differences between the first snapshot and the second snapshot to produce a list of actions, wherein a modification to a file or directory path having a first directory location includes a first action to rename a file from the first directory location to a temporary storage location and a second action to rename the file from the temporary storage location to a second directory location; and provide the generated actions to a backup system. The backup system may apply the generated actions to a first backup associated with the first snapshot to produce a second backup associated with the second snapshot.
-
公开(公告)号:US11847028B2
公开(公告)日:2023-12-19
申请号:US16920490
申请日:2020-07-03
Applicant: VMware, Inc.
Inventor: Abhay Kumar Jain , Wenguang Wang
CPC classification number: G06F11/1451 , G06F11/1461 , G06F11/1464 , G06F11/1469 , G06F16/128 , G06F16/162 , G06F16/1748 , G06F16/1873 , G06F2201/80
Abstract: Techniques for efficiently exporting snapshot changes are provided. In some embodiments, a system may receive a first snapshot of a data set in a storage system and a second snapshot the data set in the storage system. The system may further generate actions based on differences between the first snapshot and the second snapshot to produce a list of actions, wherein a modification to a file or directory path having a first directory location includes a first action to rename a file from the first directory location to a temporary storage location and a second action to rename the file from the temporary storage location to a second directory location; and provide the generated actions to a backup system. The backup system may apply the generated actions to a first backup associated with the first snapshot to produce a second backup associated with the second snapshot.
-
公开(公告)号:US11494334B2
公开(公告)日:2022-11-08
申请号:US17119959
申请日:2020-12-11
Applicant: VMware, Inc.
Inventor: Sriram Patil , Abhay Kumar Jain , Wenguang Wang , Nitin Rastogi , Pranay Singh , Richard P. Spillane
IPC: G06F17/00 , G06F7/00 , G06F16/11 , G06F16/185 , G06F16/174
Abstract: Techniques for efficiently managing a file clone from a filesystem which supports efficient volume snapshots are provided. In some embodiments, a system may receive an instruction to remove the file clone from the filesystem. The file clone may be a point-in-time copy of metadata of an original file. The system may further—for a file map entry in a filesystem tree associated with the file clone, the file map entry indicating a data block—decrement a reference count in a reference count entry associated with the file map entry. The reference count entry may be stored in the filesystem tree according to a key and the key may comprise an identification of the original file. The system may further reclaim the data block in a storage system when the reference count is zero.
-
公开(公告)号:US20230028391A1
公开(公告)日:2023-01-26
申请号:US17960023
申请日:2022-10-04
Applicant: VMware, Inc.
Inventor: Sriram Patil , Abhay Kumar Jain , Wenguang Wang , Nitin Rastogi , Pranay Singh , Richard P. Spillane
IPC: G06F16/11 , G06F16/185 , G06F16/174
Abstract: Techniques for efficiently managing a file clone from a filesystem which supports efficient volume snapshots are provided. In some embodiments, a system may receive an instruction to remove the file clone from the filesystem. The file clone may be a point-in-time copy of metadata of an original file. The system may further—for a file map entry in a filesystem tree associated with the file clone, the file map entry indicating a data block—decrement a reference count in a reference count entry associated with the file map entry. The reference count entry may be stored in the filesystem tree according to a key and the key may comprise an identification of the original file. The system may further reclaim the data block in a storage system when the reference count is zero.
-
公开(公告)号:US11455255B1
公开(公告)日:2022-09-27
申请号:US17328281
申请日:2021-05-24
Applicant: VMware, Inc.
Inventor: Abhay Kumar Jain , Sriram Patil , Wenguang Wang , Enning Xiang , Asit A. Desai
Abstract: Techniques for improving the read performance of an LFS-based storage system that supports COW snapshotting are provided. In one set of embodiments, the storage system can implement an intermediate map for each storage object in the system that is keyed by a composite key consisting of snapshot identifier (major key) and LBA (minor key). With this approach, contiguous logical block addresses (LBAs) of a storage object or its snapshots will map to contiguous -to-PBA mappings in the storage object's intermediate map, resulting in good spatial locality for those LBAs and robust read performance.
-
公开(公告)号:US11086779B2
公开(公告)日:2021-08-10
申请号:US16679570
申请日:2019-11-11
Applicant: VMware, Inc.
Inventor: Wenguang Wang , Mounesh Badiger , Abhay Kumar Jain , Junlong Gao , Zhaohui Guo , Richard P. Spillane
IPC: G06F12/08 , G06F12/0842 , G06F12/0844 , G06F12/14 , G06F12/1018 , G06F12/0871
Abstract: Disclosed are a method and system for managing multi-threaded concurrent access to a cache data structure. The cache data structure includes a hash table and three queues. The hash table includes a list of elements for each hash bucket with each hash bucket containing a mutex object and elements in each of the queues containing lock objects. Multiple threads can each lock a different hash bucket to have access to the list, and multiple threads can each lock a different element in the queues. The locks permit highly concurrent access to the cache data structure without conflict. Also, atomic operations are used to obtain pointers to elements in the queues so that a thread can safely advance each pointer. Race conditions that are encountered with locking an element in the queues or entering an element into the hash table are detected, and the operation encountering the race condition is retried.
-
公开(公告)号:US11755537B2
公开(公告)日:2023-09-12
申请号:US17202342
申请日:2021-03-15
Applicant: VMware, Inc.
Inventor: Abhay Kumar Jain , Wenguang Wang , Richard P. Spillane
CPC classification number: G06F16/1734 , G06F21/6218 , G06N5/04 , G06N20/00
Abstract: Optimizing file access includes a process for identifying a file access event for a first accessed file, and incrementing a first access counter in an access list in a memory, which also includes access counters for other accessed files. The process further includes exporting the first access counter to a performance monitoring dashboard, or exporting to a storage allocator and, based on the value, moving the first accessed file between a first storage and a second storage. The process also includes determining whether the value of the first access counter meets a first threshold, or a sum of values of the access counters for the other accessed files meets a second threshold. Based on meeting the first threshold or meeting the second threshold, the process includes persisting the access counters on a storage media. The access counters also provide security monitoring (e.g., identifying excessive file access).
-
-
-
-
-
-
-
-
-