This application relates to the field of computer technologies, and in particular, to a computer device, a data processing method, and a computer system.
With development of computer technologies, more data needs to be processed by a device. Persistent storage needs to be performed on some data in the data that needs to be processed. Persistent storage refers to a storage manner in which data is not lost due to power outage or restart of a device. How to perform persistent storage on data becomes a problem to be resolved.
This application provides a computer device, a data processing method, and a computer system, to perform persistent storage on data. Technical solutions are as follows.
According to a first aspect, a computer device is provided. The device includes a processor, at least one management chip, and at least two persistent memories, where the at least two persistent memories are connected to the processor by the at least one management chip, and each of the at least two persistent memories is configured to perform persistent storage on data. The at least one management chip is configured to control a communication state between each persistent memory and the processor, and the processor is configured to access any one of the at least two persistent memories in communication with the processor.
The communication state between the persistent memory and the processor is controlled by the management chip, so that the processor is in communication with the at least two persistent memories. Because the processor can access the at least two persistent memories in communication with the processor, and the persistent memory can be configured to perform persistent storage on the data, a storage capacity used for persistent storage of the data is expanded, an insufficient storage capacity case is avoided. In addition, a new manner for persistent data storage is further provided, which is different from a manner of performing persistent storage on data by using only a disk in a related technology.
It should be noted that the persistent memory is also referred to as a non-volatile memory (NVM), is configured to perform persistent storage on the data, and is a storage medium (also referred to as a memory or storage hardware) that does not lose the data due to power outage or restart of the device. The processor can access the persistent memory according to an instruction, and an access process does not involve an input/output (IO) operation, that is, an IO operation does not need to be performed for accessing the persistent memory.
In a possible implementation, the computer device further includes a memory controller, the at least two persistent memories are connected to the memory controller, and the memory controller is connected to the processor by the at least one management chip. The processor is configured to access the memory controller based on a logical address, and the memory controller is configured to translate the logical address into a physical address, and to access, based on the physical address, any one of the at least two persistent memories in communication with the processor. The logical address is an address used on the side of the processor, and the physical address is an address used on the side of the persistent memory, that is, different addresses are used by the processor and the persistent memory. The memory controller needs to translate an address, so that the processor accesses the persistent memory.
In a possible implementation, the processor includes a logic controller, the logic controller is configured to store redundant array of independent disks (RAID) information, and the processor is configured to access, based on the RAID information stored in the logic controller, any one of the at least two persistent memories in communication with the processor. Because the at least two persistent memories are in communication with the processor in this application, a RAID mechanism can be implemented based on the at least two persistent memories in communication with the processor, thereby improving reliability of the computer device.
In a possible implementation, the processor includes a logic controller, and the logic controller is configured to partition the at least two persistent memories to obtain regions and namespaces. The processor is configured to access at least one of the region or the namespace included in any one of the at least two persistent memories in communication with the processor. The processor accesses the persistent memory in a unit of at least one of the region or the namespace. This access manner is flexible and further improves access efficiency.
In a possible implementation, the processor includes a logic controller, and the logic controller is configured to control the at least one management chip, to control the communication state between each persistent memory and the processor by the at least one management chip. The management chip is controlled by the logic controller, to control the communication state between each persistent memory and the processor. This control manner is flexible.
In a possible implementation, there are at least two management chips, the at least two management chips are separately connected to the processor, and any one of the at least two persistent memories is connected to the processor by any one of the at least two management chips. In this implementation, the persistent memory is horizontally disposed by the management chip, thereby expanding a storage capacity used for persistent storage of the data.
In a possible implementation, there are at least two management chips, a first management chip in the at least two management chips is connected to the processor, a second management chip in the at least two management chips is connected to the first management chip, any one of the at least two persistent memories is connected to the processor by the first management chip or the second management chip, the first management chip is at least one management chip in the at least two management chips, and the second management chip is another management chip other than the first management chip in the at least two management chips. In this implementation, the persistent memory is vertically disposed by the management chip, thereby expanding a storage capacity used for persistent storage of the data.
In a possible implementation, the computer device further includes a volatile memory, the volatile memory is connected to the processor, and the processor is further configured to access the volatile memory. Based on the persistent memory, the computer device can further perform non-persistent storage on the data by using the volatile memory.
According to a second aspect, a data processing method is provided. The method is applied to a computer device. The device includes a processor, at least one management chip, and at least two persistent memories, the at least two persistent memories are connected to the processor by the at least one management chip, a communication state between each of the at least two persistent memories and the processor is controlled by the at least one management chip, and each persistent memory is configured to perform persistent storage on data. The method includes:
In a possible implementation, the device further includes a memory controller, the at least two persistent memories are connected to the memory controller, and the memory controller is connected to the processor by the at least one management chip. That the processor accesses, based on the data processing request, a target persistent memory that is in the at least two persistent memories and in communication with the processor includes: the processor accesses the memory controller based on the data processing request and a logical address. The memory controller translates the logical address into a physical address, and accesses the target persistent memory based on the physical address.
In a possible implementation, the processor includes a logic controller, and the logic controller stores RAID information. That the processor accesses, based on the data processing request, a target persistent memory that is in the at least two persistent memories and in communication with the processor includes: the processor accesses, based on the data processing request and the RAID information stored in the logic controller, the target persistent memory that is in the at least two persistent memories and in communication with the processor.
In a possible implementation, the processor includes a logic controller. The method further includes: the logic controller partitions the at least two persistent memories to obtain regions and namespaces. That the processor accesses, based on the data processing request, a target persistent memory that is in the at least two persistent memories and in communication with the processor includes: the processor accesses, based on the data processing request, at least one of the region or the namespace included in the target persistent memory that is in the at least two persistent memories and in communication with the processor.
In a possible implementation, the processor includes a logic controller. The method further includes: the logic controller controls the at least one management chip, to control the communication state between each persistent memory and the processor by the at least one management chip.
In a possible implementation, the device further includes a volatile memory, and the volatile memory is connected to the processor. The method further includes: the processor accesses the volatile memory based on the data processing request, to read data from the volatile memory or write data in the volatile memory.
According to a third aspect, a computer system is provided. The computer system includes at least two computer devices, where the computer device is the computer device provided in the first aspect or any possible implementation of the first aspect. A first computer device in the at least two computer devices is configured to send data to a second computer device, the second computer device is configured to store the data received in a persistent memory of the second computer device, the first computer device is any one of the at least two computer devices, and the second computer device is at least one computer device other than the first computer device in the at least two computer devices.
In a possible implementation, the data is data stored in a persistent memory of the first computer device.
The terms used in the implementation part of this application are merely used to explain specific embodiments of this application, and are not intended to limit this application.
As a quantity of data-oriented applications (APP) increases, a volume of data that a device needs to process increases. Persistent storage needs to be performed on some data in the device. Persistent storage refers to a storage manner in which data is not lost due to power outage or restart of a device.
In a related technology, persistent storage is performed on data by using a disk. Illustratively, the disk includes a solid state disk (SSD), a hard disk drive (HDD), a tape, or the like.
In this embodiment, a persistent memory is used to replace the disk in the related technology, and persistent storage is performed on data by using the persistent memory. Therefore, a new manner for persistent data storage is provided. In addition, at least two persistent memories are used to replace the disk. Therefore, a storage capacity used for persistent storage of the data can be expanded, thereby avoiding an insufficient storage capacity case.
An embodiment of this application provides a computer device. Referring to
In the computer device, the at least one management chip 102 is configured to control a communication state between each persistent memory 103 and the processor 101. The processor 101 is configured to access any one of the at least two persistent memories 103 in communication with the processor 101, to read data from the persistent memory 103 or write data in the persistent memory 103. For a process of accessing the persistent memory 103 by the processor 101, refer to descriptions in the following method embodiment.
Illustratively, the management chip 102 controls the communication state between each persistent memory 103 and the processor 101 in the following control manner, to control a topological link relationship between the persistent memories 103 and the processor 101. It can be understood that the following control manner is merely an example. In this embodiment, the control manner used by the management chip 102 is not limited, and the management chip 102 can select an appropriate control manner based on an actual requirement.
The management chip 102 has a switch function, that is, the management chip 102 includes an enabled state and a disabled state. Because the at least two persistent memories 103 are connected to the processor 101 by the at least one management chip 102, the at least one management chip 102 is included between one persistent memory 103 and the processor 101. For a persistent memory 103, in response to that all management chips 102 between the persistent memory 103 and the processor 101 are in the enabled state, the persistent memory 103 is in communication with the processor 101 (that is, the persistent memory 103 is bound to the processor 101), and the processor 101 can access the persistent memory 103. Alternatively, in response to that any management chip 102 between the persistent memory 103 and the processor 101 is in the disabled state, the persistent memory 103 is not in communication with the processor 101 (that is, the persistent memory 103 is unbound from the processor 101), and the processor 101 cannot access the persistent memory 103. Illustratively, for a management chip 102, the management chip 102 can control whether any persistent memory 103 connected to the management chip 102 is in communication with the processor 101. For example, the processor 101 and the two persistent memories 103 are separately connected to the management chip 102. The management chip 102 can control one of the persistent memories 103 to be in communication with the processor 101, and control the other persistent memory 103 not to be in communication with the processor 101.
In an illustrative embodiment, the persistent memory 103 is a memory for which an input/output (IO) operation does not need to be performed. The IO operation is an operation that needs to be performed when a disk is accessed, and the IO operation is, for example, a track search operation or a sector search operation. Because the IO operation needs to be performed when the disk is accessed, efficiency of data processing performed by accessing the disk is low. However, because the IO operation does not need to be performed for accessing the persistent memory 103, efficiency of data processing performed by accessing the persistent memory 103 is high, and drive writes per day (DWPD) of the persistent memory 103 are further increased. Therefore, the persistent memory 103 has high reliability. When the device includes such a persistent memory 103 for which the IO operation does not need to be performed, if a service is interrupted because the device is shut down, data stored in the persistent memory 103 is not lost, and a recovery time object (RTO) is shortened because the efficiency of data processing performed by accessing the persistent memory 103 is high, thereby ensuring service stability.
In this embodiment, the disk is replaced with the persistent memory 103. Therefore, a new persistent storage manner is provided. In addition, because there are at least two persistent memories 103 in this embodiment of this application, a storage capacity used for persistent storage of the data can be expanded, thereby avoiding an insufficient storage capacity case. In addition, because the IO operation does not need to be performed for accessing the persistent memory 103, but the IO operation needs to be performed for accessing the disk, the IO operation can be not involved in a data processing process by using the persistent memory 103, thereby saving time for performing the IO operation, and improving data processing efficiency.
Illustratively, the persistent memory 103 includes but is not limited to a persistent memory (PMEM). Referring to
In an illustrative embodiment, the at least two persistent memories 103 are horizontally disposed. There are at least two management chips 102, and the at least two management chips 102 are separately connected to the processor 101. Any one of the at least two persistent memories 103 is connected to the processor 101 by any one of the at least two management chips 102. For example, referring to
In an illustrative embodiment, the at least two persistent memories 103 are vertically disposed. There are at least two management chips 102, a first management chip in the at least two management chips 102 is connected to the processor 101, a second management chip in the at least two management chips 102 is connected to the first management chip, and any one of the at least two persistent memories 103 is connected to the processor 101 by the first management chip or the second management chip. The first management chip is at least one management chip in the at least two management chips 102, and the second management chip is another management chip other than the first management chip in the at least two management chips 102. For example, the first management chip includes a management chip 1 and a management chip 2, and the second management chip includes a management chip 3. Referring to
The foregoing describes the processor 101, the management chip 102, and the persistent memory 103 that are included in the computer device. Illustratively, the computer device further includes other components, which are separately described below.
In an illustrative embodiment, the computer device further includes a memory controller. The at least two persistent memories 103 are connected to the memory controller, and the memory controller is connected to the processor 101 by the at least one management chip 102. Illustratively, the memory controller is in a one-to-one correspondence with the persistent memory 103. Referring to
Referring to
Illustratively, referring to
Illustratively, the volatile memory includes but is not limited to a dynamic random access memory (DRAM), a cache, or a register shown in
Illustratively,
Referring to
In
Based on the computer devices described in
1101: the processor receives a data processing request.
Illustratively, referring to
1102: the processor accesses, based on the data processing request, a target persistent memory that is in at least two persistent memories and in communication with the processor, to read data from the target persistent memory or write data in the target persistent memory.
A manner in which the processor accesses a persistent memory includes: the processor sends a data processing instruction to the persistent memory. Illustratively, the processor determines, based on the address in the data processing request, whether the data that needs to be processed is persistent data. In response to determining that the data that needs to be processed is persistent data, the processor sends the data processing instruction to the target persistent memory. Illustratively, the processor stores an address range corresponding to each persistent memory, and in response to that the address in the data processing request is located in the address range corresponding to the persistent memory, it is determined that the data that needs to be processed is persistent data. Then, the processor performs encapsulation based on the processing identifier and the address to obtain the data processing instruction, and sends the data processing instruction to the target persistent memory.
In response to that the processing manner indicated by the processing identifier is reading, the data processing instruction is used by the processor to read the persistent data from the target persistent memory based on the address. The processor may return the read data to the OS, or perform processing such as calculation on the read data and return a processing result to the OS, to complete processing for the data processing request. Referring to
In response to determining that the data that needs to be processed is non-persistent data, the processor no longer accesses the persistent memory, but accesses the volatile memory in the computer device. In an illustrative embodiment, the method further includes: the processor accesses the volatile memory based on the data processing request, to read data from the volatile memory or write data in the volatile memory. Illustratively, the processor stores an address range corresponding to the volatile memory, and in response to that the address of the data that needs to be processed is located in the address range corresponding to the volatile memory, it is determined that the data that needs to be processed is non-persistent data. Therefore, the data processing instruction is obtained through encapsulation based on the processing identifier and the address, and the data processing instruction is sent to the volatile memory.
In a case where the data that needs to be processed is persistent data, in some implementations, the address in the data processing instruction is a physical address of the persistent data (that is, a DPA used on the side of the persistent memory). In some other implementations, when the computer device includes the memory controller configured to perform address translation, the address in the data processing instruction is a logical address of the persistent data (that is, an HPA used on the side of the processor). That the processor accesses, based on the data processing request, a target persistent memory that is in at least two persistent memories and in communication with the processor includes: the processor accesses the memory controller based on the data processing request and a logical address. The memory controller translates the logical address into a physical address, and accesses the target persistent memory based on the physical address.
The processor stores a logical address range corresponding to each persistent memory. That the processor accesses the memory controller based on the logical address includes: the logical address of the persistent data is located in a logical address range corresponding to a certain persistent memory, the processor accesses a memory controller corresponding to the certain persistent memory, that is, sends the data processing instruction including the processing identifier and the logical address to the memory controller corresponding to the certain persistent memory. The memory controller parses the data processing instruction to obtain the processing identifier and the logical address, to translate the logical address into the physical address. Referring to
In an illustrative embodiment, in a case where the processor includes the logic controller, the method further includes: the logic controller partitions the at least two persistent memories to obtain regions and namespaces. For ease of understanding, the following describes the region and the namespace first with reference to
The persistent memory includes a label storage area (LSA) and data. Illustratively, a first byte range in the persistent memory is used to store the LSA, and a second byte range is used to perform persistent storage on the data. In some implementations, the first byte range includes bytes of a reference length starting from a start address of the persistent memory, and the second byte range includes other bytes after the first byte range. The reference length is not limited in this embodiment.
The persistent memory is composed of a plurality of storage units. The storage units are not limited in this embodiment. Referring to
The LSA includes a region label and a namespace label. The region label is used to indicate a region in the persistent memory, and the namespace is used to indicate a namespace in the persistent memory. Illustratively, the region label includes the following information a) to information e), and the namespace label includes the following information f) to information i):
The foregoing describes the region and the namespace. In an illustrative embodiment, that the logic controller partitions the at least two persistent memories includes: the logic controller sends a query instruction to the persistent memory, where the query instruction is used to obtain memory information of the persistent memory; and the persistent memory sends the memory information to the logic controller according to the query instruction. Then, the logic controller sends a configuration instruction to the persistent memory based on the memory information, where the configuration instruction is used by the persistent memory to configure the region and the namespace, and the persistent memory configures the region and the namespace according to the configuration instruction. Certainly, in addition to the region and the namespace, the configuration instruction may be further used to instruct the persistent memory to configure the region label and the namespace label.
Illustratively, the memory information includes but is not limited to memory capacity information and LSA information. The memory capacity information includes information of being configured but not in use (e.g., and being used later) and a used capacity, and the LSA information includes information about the region label and the namespace label. The processor obtains the memory capacity information according to a query instruction “get partition information”, and obtains the LSA information according to a query instruction “get LSA”. The configuration instruction includes: “set partition information”, used to instruct the persistent memory to configure the region and the namespace. The configuration instruction further includes: “set LSA”, used to instruct the persistent memory to configure the region label and the namespace label. In addition, the processor can further obtain a total capacity of the persistent memory according to an instruction “identify memory device command”.
In a case where the logic controller partitions the persistent memory, that the processor accesses, based on the data processing request, a target persistent memory that is in at least two persistent memories and in communication with the processor includes: the processor accesses, based on the data processing request, at least one of the region or the namespace included in the target persistent memory that is in the at least two persistent memories and in communication with the processor. Illustratively, in this case, in addition to the processing identifier and the address, the data processing instruction sent by the processor further includes at least one of the region UUID and the namespace identifier described above. The region UUID is used to indicate a region in which the persistent data is located in the persistent memory, and the namespace identifier is used to indicate a namespace in which the persistent data is located in the persistent memory. Illustratively, in a case where the processor accesses the region, the data processing instruction includes the region UUID. In a case where the processor accesses the namespace, the data processing instruction includes only the namespace identifier, or includes both the namespace identifier and the region UUID. After the region or the namespace is determined, a relative position of the persistent data in the region or the namespace is determined based on the address, and successively indexing is performed based on the relative position to reach the persistent data. In the case where the processor includes the memory controller, a process of indexing to reach the persistent data may be performed by the memory controller. The following describes a process of indexing to reach the persistent data by using an example in which the namespace in the persistent memory is accessed, and the data processing instruction includes only the namespace identifier.
The region information of the region label includes a namespace identifier of each namespace in the region. Therefore, by querying the region information based on the namespace identifier included in the data processing instruction, the region in which the namespace indicated by the namespace identifier is located can be determined. In addition, the namespace information of the namespace label includes the address range of the namespace, for example, the start address and the length of the namespace. Therefore, the relative position of the persistent data in the namespace indicated by the namespace label can be determined based on the namespace information and the address. Illustratively, the relative position is an offset (e.g., position) of a start address of the persistent data relative to the start address of the namespace. Therefore, indexing is first performed to reach the region in which the namespace is located, indexing is performed in the region to reach the namespace, and then indexing is performed based on the relative position of the persistent data in the namespace to reach the persistent data.
In addition, a data processing apparatus in this embodiment includes at least two persistent memories, so that a RAID mechanism can be implemented based on the at least two persistent memories, thereby improving reliability of the computer device. In an illustrative embodiment, in a case where the processor includes the logic controller and the logic controller stores RAID information, that the processor accesses, based on the data processing request, a target persistent memory that is in at least two persistent memories and in communication with the processor includes: the processor accesses, based on the data processing request and the RAID information stored in the logic controller, the target persistent memory that is in the at least two persistent memories and in communication with the processor.
The RAID mechanism defines a data stripe, and one data stripe includes at least two data blocks. The RAID mechanism includes but is not limited to a plurality of levels such as RAID 0 to RAID 6. The levels included in the RAID mechanism are not limited in this embodiment, and any RAID level is selected based on an actual requirement. Illustratively, the RAID information stored in the logic controller includes but is not limited to levels and protocol stacks of RAID. For example, in RAID 0, the data blocks included in the data stripe are distributed into the at least two persistent memories for storage, and one persistent memory is configured to store at least one data block. For example, one data stripe includes eight data blocks A0 to A7, and there are two persistent memories. In this case, one persistent memory stores the data blocks A0 to A3, and the other persistent memory stores the data blocks A4 to A7. For another example, in RAID 1, the data blocks included in the data stripe are respectively stored in the at least two persistent memories, so that the at least two persistent memories are mirrored. The following describes RAID 5.
In an illustrative embodiment, there are at least three persistent memories, verification data is stored in a first persistent memory among the at least three persistent memories, and data blocks are stored in a second persistent memory among the at least three persistent memories. That the processor accesses, based on the RAID information stored in the logic controller, the target persistent memory that is in the at least two persistent memories and in communication with the processor includes: in response to detecting a failure of a data block stored in a second target persistent memory, the processor obtains, based on the RAID information, the verification data stored in the first persistent memory and other data blocks; and the processor recovers, based on the verification data and the data blocks stored in another second persistent memory, the failed data block in the second target persistent memory. The other data blocks are the data blocks stored in the another second persistent memory other than the second target persistent memory.
The first persistent memory is any one of the at least three persistent memories, and the second persistent memory is a persistent memory other than the first persistent memory among the at least three persistent memories. A quantity of first persistent memories and a quantity of second persistent memories are not limited in this embodiment. Illustratively, the second persistent memory is a persistent memory in which the address in the data processing request is located. That is, when the processor accesses a persistent memory based on the data processing request, in response to detecting the failure of a data block in the persistent memory, the method in the foregoing description may be performed to recover the failed data block in the persistent memory.
Illustratively, the persistent memory is configured to perform persistent storage on at least one data stripe, and one data stripe corresponds to verification data. The verification data and the data blocks are separately stored in different persistent memories persistently. When the second persistent memory that stores the data block is damaged, the data block stored in the second persistent memory is failed. Therefore, the processor obtains the verification data from the first persistent memory, and obtains another data block, other than the failed data block, in the data stripe from the another second persistent memory, so that the failed data block can be recovered based on the verification data and the another data block. The foregoing describes a case in which the persistent memory stores one data stripe. A case in which the persistent memory stores at least two data stripes is the same as that in the foregoing description. In some implementations, when the persistent memory stores at least two data stripes, verification data corresponding to the at least two data stripes are respectively located in different persistent memories.
In conclusion, in the embodiments of this application, the communication state between the persistent memory and the processor is controlled by the management chip, so that the processor is in communication with the at least two persistent memories. The processor can access the at least two persistent memories in communication with the processor, and the persistent memory can be configured to perform persistent storage on the data. Therefore, a storage capacity used for persistent storage of the data is expanded, and an insufficient storage capacity case is avoided. In addition, a new manner for persistent data storage is provided, which is different from a manner in which persistent storage is performed on the data by using only a disk in a related technology.
An embodiment of this application provides a computer system. The computer system includes at least two computer devices. The computer device is the computer device corresponding to any one of the accompanying drawings
A first computer device in the at least two computer devices is configured to send data to a second computer device, the second computer device is configured to store the received data in a persistent memory of the second computer device, the first computer device is any one of the at least two computer devices, and the second computer device is at least one computer device other than the first computer device in the at least two computer devices. The second computer device writes the received data in the persistent memory of the second computer device. For a writing process, refer to the description in the foregoing method embodiment. Illustratively, the first computer device sends the data to the second computer device by a high-speed network. A manner of transmitting the data between the first computer device and the second computer device is not limited in this embodiment.
In an illustrative embodiment, the data is data stored in a persistent memory of the first computer device. The first computer device reads the data from the persistent memory of the first computer device. For a reading process, refer to the description in the foregoing method embodiment.
It should be understood that the foregoing processor may be a central processing unit (CPU), or may be another general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA) or another programmable logic device, a discrete gate or a transistor logic device, a discrete hardware component, or the like. The general-purpose processor may be a microprocessor, or may be any conventional processor or the like. It should be noted that the processor may be a processor supporting an advanced reduced instruction set computer machine (advanced RISC machine, ARM) architecture.
All or some of the foregoing embodiments may be implemented by software, hardware, firmware, or any combination thereof. When software is used for implementation, all or some of the embodiments may be implemented in a form of a computer program product. The computer program product includes one or more computer instructions. When computer program instructions are loaded and executed on a computer, the procedures or functions described in this application are completely or partially generated. The computer may be a general-purpose computer, a special-purpose computer, a computer network, or another programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or may be transmitted from a computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center to another website, computer, server, or data center in a wired (for example, a coaxial cable, an optical fiber, or a digital subscriber line) or wireless (for example, infrared, radio, microwave, or the like) manner. The computer-readable storage medium may be any available medium that can be accessed by the computer, or a data storage device, for example, a server or a data center that includes one or more available media. The available medium may be a magnetic medium (for example, a floppy disk, a hard disk, or a tape), an optical medium (for example, a digital versatile disc (DVD)), a semiconductor medium (for example, a solid state disk (SSD)), or the like.
The foregoing are merely embodiments of this application, and are not intended to limit this application. Any modification, equivalent replacement, improvement, and the like made within the spirit and principle of this application shall fall within the protection scope of this application.
| Number | Date | Country | Kind |
|---|---|---|---|
| 202111130176.5 | Sep 2021 | CN | national |
This application is a continuation of International Application No. PCT/CN2022/121181, filed on Sep. 26, 2022, which claims priority to Chinese Patent Application No. 202111130176.5, filed on Sep. 26, 2021. The disclosures of the aforementioned applications are hereby incorporated by reference in their entireties.
| Number | Date | Country | |
|---|---|---|---|
| Parent | PCT/CN2022/121181 | Sep 2022 | WO |
| Child | 18615003 | US |