G06F3/0632

Dynamic storage device system configuration adjustment

Embodiments of the present disclosure relate to dynamically adjusting storage device system configurations. Information from one or more storage devices is collected. Dynamic adjustment of each storage device's system configuration is enabled based on the information. The information can include performance data, telemetry data, system configuration data, component configuration data, change events/commands, and/or alerts. Each storage device's components can be monitored with at least one daemon. Information patterns can be identified. The patterns can be matched to spikes in data traffic and/or storage device performance. The matched patterns and spikes can be correlated with each storage device's performance and errors. Storage device system configuration adjustment options can be determined. Rules for each option can be generated. Dynamic adjustment of each storage device's system configuration based on the generated one or more rules can be enabled.

Software instruction set update of memory die using page buffers

Disclosed in some examples are methods, systems, devices, memory controllers, memory dies, memory devices, and machine-readable mediums that allow for efficient updating of software instructions of the memory die. In some examples, the controller of the memory device may cause the software instructions of one or more memory dies to be updated by causing the page buffers of the one or more memory dies to be loaded with updated software instructions and subsequently issuing a command to the memory die to update the software instructions from the page buffer.

Systems and methods for configuring a data storage device

The present disclosure generally relates to systems and methods by which a data storage device may receive data about the host system in which it is installed, and the customer associated with that system. Based upon this received data, the data storage device may modify its native operating parameters and custom functions to enable more optimal operation with the host system.

ZONED MEMORY DEVICE RECOVERY AFTER A KEY-VALUE STORE FAILURE
20220357859 · 2022-11-10 ·

A system includes a zoned memory device allocating a zone storing a block belonging to a key-value set, and a processing device, operatively coupled with the zoned memory device, to perform operations including obtaining zone status information associated with the zone, identifying that the zone is a non-filled zone in view of the zone status information, and recovering the non-filled zone to obtain a recovered zone.

METHOD FOR MANAGING EXTENTS OF A SYSTEM HAVING A PROTECTION POOL
20220357865 · 2022-11-10 ·

A method of managing extents of a file system having a protection pool includes collecting and initializing physical extent manager (PEM) metadata, using a PEM daemon thread. The PEM is configured to run on each of a number of nodes. The method also includes creating a request queue, using the PEM daemon thread, for all requests submitted to the PEM. The method also includes scanning the request queue, using a PEM worker thread, to handle incoming requests submitted to the PEM. The method also includes listening for multicast messages, using a PEM multicast listener thread, to be handled by the PEM worker thread.

METHOD FOR REASSEMBLING LOCAL DISK MANAGERS AND ARRAY GROUPS
20220357866 · 2022-11-10 ·

A method of reassembling a local disk manager (LDM) and array group (AGRP) includes starting a physical extent manager (PEM) configured to run on a number of nodes. The PEM on each node is configured to manage an AGRP running on the same node. A number of LDMs are reassembled, and each LDM is configured to manage virtual disks on each of the nodes. Once enough LDMs are reassembled, an AGRP can be reassembled.

METHOD FOR ADDING DISKS IN A RAID SYSTEM HAVING A PROTECTION POOL OF STORAGE UNITS
20220357867 · 2022-11-10 ·

A method of adding a disk in a redundant array of independent disks (RAID) system with a protection pool of storage units includes receiving a request to add a new physical disk to a storage cluster and partitioning the new physical disk into a set of physical extents. The method further includes allocating one or more physical extents of the set of physical extents of the new physical disk to at least one array of physical extents, wherein the array of physical extents is distributed across physical disks of the storage cluster.

MEMORY PHYSICAL PRESENCE SECURITY IDENTIFICATION
20230041373 · 2023-02-09 ·

A system includes a memory component and a processing device, operatively coupled with the memory component, to generate a physical presence security identification (PSID) for the memory component using a statistically random number generator. The processing device, operatively coupled with the memory component, can securely retrieve the PSID and revert the memory component to an original state using the PSID.

Virtual machine backup and restoration

Reversing deletion of a virtual machine including managing, by a storage system, a repository of virtual machine snapshots on a datastore; receiving, by the storage system, a request to recover a deleted virtual machine from the datastore; accessing, by the storage system, the repository of virtual machine snapshots on the datastore to generate a list of deleted virtual machines associated with virtual machine snapshots in the repository of virtual machine snapshots; receiving, by the storage system, a selection of one of the deleted virtual machines in the list of deleted virtual machines; and recovering, by the storage system, the selected deleted virtual machine using a virtual machine snapshot for the selected deleted virtual machine.

Maintaining data structures in a memory subsystem comprised of a plurality of memory devices

Provided are a computer program product, system, and method for maintaining data structures in a virtual memory comprised of a plurality of heterogeneous memory devices. Access counts are maintained for a plurality of data structures stored in a first level memory device. A determination is made of data structures in the first level memory device having lowest access counts. The determined data structures are deleted from the first level memory device and retaining copies of the data structures in a second level memory device, wherein the first level memory device has lower latency than the second level memory device.