The disclosure relates generally to storage devices, and more particularly to storage devices that may self-heal.
Although storage devices tend to have a high degree of reliability, they may nevertheless make errors in storage. This, it may be expected that eventually, at some point during the life expectancy of a storage device, an error will occur. This error may be a read error (i.e., an error that occurred when trying to read data), a write error (i.e., an error that occurred when trying to write data), or an error in the storage device controller (i.e., some unexpected condition occurred within the storage device controller), among other possibilities.
A need remains to for a storage device to self-heal.
The drawings described below are examples of how embodiments of the disclosure may be implemented, and are not intended to limit embodiments of the disclosure. Individual embodiments of the disclosure may include elements not shown in particular figures and/or may omit elements shown in particular figures. The drawings are intended to provide illustration and may not be to scale.
Embodiments of the disclosure include the ability to route commands to a computational storage unit. When a command is received, a command router may determine whether the command is a command to be handled by a storage device or by the computational storage unit. The command may then be directed to either the storage device or the computational storage unit.
Reference will now be made in detail to embodiments of the disclosure, examples of which are illustrated in the accompanying drawings. In the following detailed description, numerous specific details are set forth to enable a thorough understanding of the disclosure. It should be understood, however, that persons having ordinary skill in the art may practice the disclosure without these specific details. In other instances, well-known methods, procedures, components, circuits, and networks have not been described in detail so as not to unnecessarily obscure aspects of the embodiments.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first module could be termed a second module, and, similarly, a second module could be termed a first module, without departing from the scope of the disclosure.
The terminology used in the description of the disclosure herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in the description of the disclosure and the appended claims, the singular forms “a”, “an”, and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will also be understood that the term “and/or” as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. The components and features of the drawings are not necessarily drawn to scale.
Storage device maintenance is a process that may generally be reactive. When the storage device experiences a problem, the storage device notifies the host of the problem, for example, through asynchronous event notification (AEN). The host may then determine one or more actions to take to at least partially resolve the problem. Such actions may include applying error correction using data that might not be available to the storage device, disabling particular locations within the storage device that may experience errors so that they are not used in the future, changing the configuration of the storage device so that the storage device might be able to correct errors in the future, or removing the device from service.
When an error occurs, the storage device may notify a host machine of the error. The host machine may then decide what remediation operations to take. This remediation may involve attempting to compensate for the error at the host level (for example, applying an external error correction algorithm that may use data available to the host machine that might not be available to the storage device), adjusting a configuration of the storage device (for example, changing how the storage device applies an internal error correction algorithm) in an attempt to prevent future errors, or migrating data from the storage device to another storage device (for example, if the storage device appears to be on the verge of failing), among other possibilities.
Having the host machine perform error correction may take time. That is, it may take some time for the host machine to receive the notification of the error and then respond to that notification. In addition, the host machine may manage multiple storage devices: dealing with the error on one storage device may reduce the available resources of the host for other processing.
Embodiments of the disclosure are generally directed to systems and methods to address these problems by using a computational storage unit that is either part of the storage device or associated with the storage device. The computational storage unit may have its own processing resources which may be used, reducing the load on the host to resolve problems with the storage device.
In some aspects of embodiments of the disclosure, the host may download and use one or more programs, which may be associated with particular events that may be triggered by the storage device. A single program may be associated with multiple events, and a single event may trigger multiple programs. The program may also be built into the storage device and/or the computational storage unit. Upon receiving an event, an event framework may determine the associated program(s) to trigger and may start the execution of the program(s). Depending on the operation of the program, it might not be necessary to notify the host that an error occurred using AEN.
Processor 110 may be coupled to memory 115. Memory 115 may be any variety of memory, such as flash memory, Dynamic Random Access Memory (DRAM), Static Random Access Memory (SRAM), Persistent Random Access Memory, Ferroelectric Random Access Memory (FRAM), or Non-Volatile Random Access Memory (NVRAM), such as Magnetoresistive Random Access Memory (MRAM) etc. Memory 115 may also be any desired combination of different memory types, and may be managed by memory controller 125. Memory 115 may be used to store data that may be termed “short-term”: that is, data not expected to be stored for extended periods of time. Examples of short-term data may include temporary files, data being used locally by applications (which may have been copied from other storage locations), and the like.
Processor 110 and memory 115 may also support an operating system under which various applications may be running. These applications may issue requests (which may also be termed commands) to read data from or write data to either memory 115 or storage device 120. Storage device 120 may be accessed using device driver 130.
Storage device 120 may be associated with computational storage unit 135. As discussed below with reference to
In addition, the connection between storage device 120 and paired computational storage unit 135 might enable the two devices to communicate, but might not enable one (or both) devices to work with a different partner: that is, storage device 120 might not be able to communicate with another computational storage unit, and/or computational storage unit 135 might not be able to communicate with another storage device. For example, storage device 120 and paired computational storage unit 135 might be connected serially (in either order) to a fabric such as a bus, enabling computational storage unit 135 to access information from storage device 120 in a manner another computational storage unit might not be able to achieve.
Processor 110 and storage device 120 may be connected to a fabric. The fabric may be any fabric along which information may be passed. The fabric may include fabrics that may be internal to machine 105, and which may use interfaces such as Peripheral Component Interconnect Express (PCIe), Serial AT Attachment (SATA), Small Computer Systems Interface (SCSI), among others. The fabric may also include fabrics that may be external to machine 105, and which may use interfaces such as Ethernet, InfiniBand, or Fibre Channel, among others. In addition, the fabric may support one or more protocols, such as Non-Volatile Memory (NVM) Express (NVMe), NVMe over Fabrics (NVMe-oF), or Simple Service Discovery Protocol (SSDP), among others. Thus, the fabric may be thought of as encompassing both internal and external networking connections, over which commands may be sent, either directly or indirectly, to storage device 120 (and more particularly, the computational storage unit associated with storage device 120).
While
While
Computational device 310-1 may be paired with storage device 305. Computational device 310-1 may include any number (one or more) processors 330, which may offer one or more services 335-1 and 335-2. To be clearer, each processor 330 may offer any number (one or more) services 335-1 and 335-2 (although embodiments of the disclosure may include computational device 310-1 including exactly two services 335-1 and 335-2). Each processor 330 may be a single core processor or a multi-core processor. Computational device 310-1 may be reachable across queue pairs 340, which may be used for both management of computational device 310-1 and/or to control I/O of computational device 310-1
Processor(s) 330 may be thought of as near-storage processing: that is, processing that is closer to storage device 305 than processor 110 of
While
Services 335-1 and 335-2 may offer a number of different functions that may be executed on data stored in storage device 305. For example, services 335-1 and 335-2 may offer pre-defined functions, such as encryption, decryption, compression, and/or decompression of data, erasure coding, and/or applying regular expressions. Or, services 335-1 and 335-2 may offer more general functions, such as data searching and/or SQL functions. Services 335-1 and 335-2 may also support running application-specific code. That is, the application using services 335-1 and 335-2 may provide custom code to be executed using data on storage device 305. Services 335-1 and 335-2 may also any combination of such functions. Table 1 lists some examples of services that may be offered by processor(s) 330.
Processor(s) 330 (and, indeed, computational device 310-1) may be implemented in any desired manner. Example implementations may include a local processor, such as Central Processing Unit (CPU) or some other processor, a Graphics Processing Unit (GPU), a General Purpose GPU (GPGPU), a Data Processing Unit (DPU), a Tensor Processing Unit (TPU), or a Neural Processing Unit (NPU), among other possibilities. Processor(s) 330 may also be implemented using a Field Programmable Gate Array (FPGA) or an Application-Specific Integrated Circuit (ASIC), among other possibilities. If computational device 310-1 includes more than one processor 330, each processor may be implemented as described above. For example, computational device 310-1 might have one each of CPU, TPU, and FPGA, or computational device 310-1 might have two FPGAs, or computational device 310-1 might have two CPUs and one ASIC, etc.
Depending on the desired interpretation, either computational device 310-1 or processor(s) 330 may be thought of as a computational storage unit.
Whereas
In yet another variation shown in
In addition, processor(s) 330 may have proxied storage access 350 to storage 320-1. Thus, instead of routing access requests through controller 315, processor(s) 330 may be able to directly access the data from storage 320-1.
In
Finally,
Because computational device 310-4 may include more than one storage element 320-1 through 320-4, computational device 310-4 may include array controller 355. Array controller 355 may manage how data is stored on and retrieved from storage elements 320-1 through 320-4. For example, if storage elements 320-1 through 320-4 are implemented as some level of a Redundant Array of Independent Disks (RAID), array controller 355 may be a RAID controller. If storage elements 320-1 through 320-4 are implemented using some form of Erasure Coding, then array controller 355 may be an Erasure Coding controller.
SSD 120 may also include host interface layer 410, which may manage interface 405. If SSD 120 includes more than one interface 405, a single host interface layer 410 may manage all interfaces, SSD 120 may include a host interface layer for each interface, or some combination thereof may be used.
SSD 120 may also include SSD controller 415, various channels 420-1, 420-2, 420-3, and 420-4, along which various flash memory chips 425-1, 425-2, 425-3, 425-4, 425-5, 425-6, 425-7, and 425-8 may be arrayed (flash memory chips 425-1 through 425-8 may be referred to collectively as flash memory chips 425). SSD controller 415 may manage sending read requests and write requests to flash memory chips 425-1 through 425-8 along channels 420-1 through 420-4 (which may be referred to collectively as channels 420). Although
Within each flash memory chip, the space may be organized into blocks, which may be further subdivided into pages, and which may be grouped into superblocks. Page sizes may vary as desired: for example, a page may be 4 KB of data. If less than a full page is to be written, the excess space is “unused”. Blocks may contain any number of pages: for example, 140 or 230. And superblocks may contain any number of blocks. A flash memory chip might not organize data into superblocks, but only blocks and pages.
While pages may be written and read, SSDs typically do not permit data to be overwritten: that is, existing data may be not be replaced “in place” with new data. Instead, when data is to be updated, the new data is written to a new page on the SSD, and the original page is invalidated (marked ready for erasure). Thus, SSD pages typically have one of three states: free (ready to be written), valid (containing valid data), and invalid (no longer containing valid data, but not usable until erased) (the exact names for these states may vary).
But while pages may be written and read individually, the block is the basic unit of data that may be erased. That is, pages are not erased individually: all the pages in a block are typically erased at the same time. For example, if a block contains 230 pages, then all 230 pages in a block are erased at the same time. This arrangement may lead to some management issues for the SSD: if a block is selected for erasure that still contains some valid data, that valid data may need to be copied to a free page elsewhere on the SSD before the block may be erased. (In some embodiments of the disclosure, the unit of erasure may differ from the block: for example, it may be a superblock, which as discussed above may be a set of multiple blocks.)
Because the units at which data is written and data is erased differ (page vs. block), if the SSD waited until a block contained only invalid data before erasing the block, the SSD might run out of available storage space, even though the amount of valid data might be less than the advertised capacity of the SSD. To avoid such a situation, SSD controller 415 may include a garbage collection controller (not shown in
SSDs also have a finite number of times each cell may be written before cells may not be trusted to retain the data correctly. This number is usually measured as a count of the number of program/erase cycles the cells undergo. Typically, the number of program/erase cycles that a cell may support mean that the SSD will remain reliably functional for a reasonable period of time: for personal users, the user may be more likely to replace the SSD due to insufficient storage capacity than because the number of program/erase cycles has been exceeded. But in enterprise environments, where data may be written and erased more frequently, the risk of cells exceeding their program/erase cycle count may be more significant.
To help offset this risk, SSD controller 415 may employ a wear leveling controller (not shown in
SSD controller 415 may include flash translation layer (FTL) 430 (which may be termed more generally a translation layer, for storage devices that do not use flash storage), event framework 435, and event table 440. FTL 430 may handle translation of LBAs or other logical IDs (as used by processor 110 of
Each event ID may be associated with a particular program ID: event ID 505-1 is shown as associated with program ID 510-1, event ID 505-2 is shown as associated with program ID 510-2, and event ID 505-3 is shown as associated with program ID 510-3 (program IDs 510-1, 510-2, and 510-3 may be referred to collectively as program IDs 510). Note that program IDs 510 may be merely identifiers of programs, whose locations may be stored elsewhere (and whose locations may be determined using program IDs 510: perhaps by another table that maps program IDs to addresses in a memory where the program is stored), or program IDs 510 may be pointers to where the programs are stored in a memory, or program IDs 510 may be a copy of the code to be executed when the associated event ID 505 is received, among other possibilities: all such possibilities are intended to be covered by event table 440. While event table 440 shows three such pairings of event ID and program ID, embodiments of the disclosure may include any number (one or more) of such associations. (Technically, zero such associations are possible as well, but in that case event framework 435 would not be able to trigger a program to perform any remediation on storage device 120 of
When event framework 435 of
Event table 440 shows two interesting situations that are worth noting. First, note that event IDs 505-1 and 505-2 are both associated with program ID 3. This situation shows that a single program may be able to perform remediation for multiple different events that may occur in storage device 120 of
Second, note that event IDs 505-2 and 505-3 are the same, but are associated with different program IDs 510-2 and 510-3. This situation shows that a single event ID may trigger multiple different programs. Whether those programs are executed in parallel or sequentially may depend on whether computational storage unit 135 of
The programs identified by program IDs 510 may be any desired type of program. For example, the programs may be diagnostic programs, collecting information about an event. Or, the programs may be reactive programs, designed to try and resolve the issues identified by the events. Examples of reactive programs may include programs to attempt to recover data (such as may occur if data is spread across multiple storage devices with redundancy, such as may occur with data in levels 1, 4, 5, and 6 of a Redundant Array of Independent Disks (RAID) array), failover programs (which may change where data is stored to avoid a storage device that is beginning to fail), and deduplications programs (which may use data deduplication to free up space on the storage device). Events may also occur due to operations within computational storage unit 135: for example, due to an error within a memory of computational storage unit 135. Or, the programs may be artificial intelligence (AI)/machine learning programs, designed to try and predict future failures of the storage device based on events that have occurred to date. Different types of programs may be used in response to different events: embodiments of the disclosure may include as many programs as desired, which may be of the same or different types.
The programs identified by program IDs 510 may be of any desired format. For example, the programs may be extended Berkeley packet filter (eBPF) Executable and Linkable Format (ELF) programs, FPGA bitstreams, programs that are executable under an operating system supported by computational storage unit 135, and so on. In short, the programs may be any code that may be executed by computational storage unit 135.
The programs may also update any relevant information in storage device 120 and/or computational storage unit 135. For example, the programs may update a program log with information about the operation of the program. But the programs may also clear any events after the programs have handled the event. In this manner, the occurrence and remediation of an event may be performed transparently to machine 105 of
The programs identified by program IDs 510 may use state information to determine whether to execute or not. For example, a program might be executed only the first time the event occurs, with any subsequent events not triggering the program. This may be accomplished, as said above, but storing state information in computational storage unit 135. The program may access the state information to determine if the program has been executed before. If the program has not been executed before, the program may execute and set the state information accordingly; if the program has been executed before, then the program might not execute. Another way in which a program might limit its own future execution would be to disable its own execution, using a command similar to one that may disable AEN, or to update event table 440 to remove the association between the event ID and the program ID.
As another example of the use of state information, a program may count the number of times the program has been executed. The program may then compare that number with a threshold and may use that information to manage what the program does. For example, a program that recovers from failures to read data may track the number of read errors that occur within storage device 120 of
The programs may also interact with other devices within machine 105 of
In some embodiments of the disclosure, storage device 120 of
This concept may be generalized further: an event that occurs in one storage device might be handled by another storage device (or computational storage unit associated with another storage device). For example, consider the situation where computational storage unit 135 of
Machine 105 may start by downloading a program to computational storage unit 135, shown as operation 605. In some embodiments of the disclosure, the program may be pre-loaded into computational storage unit 135 by the vendor, in which case operation 605 may be omitted (shown by operation 605 using a dashed line). If a program is pre-loaded into computational storage unit 135, machine 105 may discover the program using standard discovery techniques. Machine 105 may also instruct storage device 120 to store an association between an event ID and the program in event table 440, shown as operation 610.
At some point during its operation, storage 425 (or controller 415 of
Upon finding an association between the event ID and a program, event framework 435 may request computational storage unit 135 execute the program, shown as operation 620. Computational storage unit 135 may then execute the program to attempt remediation of the event, as shown by operation 625. Upon completion, computational storage unit 135 may log the results of the remediation in program log 630, as shown by operation 635. Program log 630 may be part of storage device 120 or computational storage unit 135 (and therefore may be outside storage device 120, if computational storage unit 135 is outside storage device 120). Program log 630 may be used to extend the error information about a command that completed with an error. Program log 630 may also be used to report an error that is not specific to a particular command. Finally, event framework may use asynchronous event notification (AEN) to notify machine 105 of the event and its remediation, as shown by operation 640. Note that if remediation was successful, machine 105 may not need to be notified about either the event or its remediation: in such situations, operation 640 may be omitted (shown by operation 640 using a dashed line).
If no entry in event table 440 may be found with the event ID, then event framework 435 may not know what to do to address the event, and may use AEN to notify machine 105 of the event, also shown as operation 640.
In some embodiments of the disclosure, there may be an entry in event table 440, associating an event with a program, but the program might not yet be stored in computational storage unit 135. For example, there might be insufficient storage within computational storage unit 135 for the program (which may occur if other programs have been downloaded). Or the event might be considered sufficiently unlikely that it is considered more desirable to download the program if the event is triggered but not before. In such situations, upon the occurrence of the event, machine 105 may be notified to start downloading the program to computational storage unit 135 so that the program may be executed.
In some embodiments of the disclosure, machine 105 might be designed to operate in a reactive mode. That is, machine 105 might know what program is to be executed upon the occurrence of an event, but machine 105 is designed to download and execute the program after machine 105 receives notification of the event. In such embodiments of the disclosure, machine 105 may remain in control of handling the events and may identify which program is to be executed by computational storage unit 135. Machine 105 may even download the program to computational storage unit 135 in response to the occurrence of the event rather than download the program in advance. In such embodiments of the disclosure, the information in event table 440 may be effectively stored within machine 105 (although storage device 120 may still include event table 440). In some of these embodiments of the disclosure, event table 440 may still identify the program to be executed, but that program might not yet be downloaded into computational storage unit 135, and machine 105 may be notified to download the program for execution in response to the event.
At operation 720, machine 105 may send various requests to storage device 120. These requests may include requests to read or write data from storage device 120, requests to perform maintenance on or to configure storage device 120, requests to utilize a service of computational storage unit 135, or any other request that may be issued to either storage device 120 or computational storage unit 135. At operation 725, storage device 120 (or computational storage unit 135, if the request was sent to or intended for computational storage unit 135) may process the requests. At operation 730, the results of these requests may be sent back to machine 105.
But in some instances, storage device 120 (or computational storage unit 135) may report an event, indicating something might not have proceeded as expected, or some data about the operation of storage device 120 and/or computational storage unit 135 has been generated. When such an event occurs, at operation 735 storage device 120 (more specifically, event framework 435 of
Storage device 120 may then use the result of the program to determine whether the problem was resolved using the program. If the problem was not resolved, then storage device 135 may use AEN at operation 755 to notify machine 105 of the event. Note that storage device 120 may use AEN at operation 755 even if the program was successful in resolving the problem, and may use AEN at operation 755 to notify machine 105 if no program was associated with the event ID in event table 440 of
At block 915, machine 105 of
At block 930, event framework 435 of
At block 945, event framework 435 of
Finally, at block 955, event framework 435 of
In
Embodiments of the disclosure enable a storage device to perform self-maintenance and/or self-remediation. By using a program executed on a computational storage unit associated with the storage device, the storage device may perform maintenance or remediation in response to events without relying on the host processor. This reduces the load on the host processor, freeing the host processor to perform other tasks. As the host processor may be responsible for managing any number of storage devices, reducing the load on the host processor may be a significant benefit.
The storage device may store pairs of event IDs and associated program IDs. These pairs may be registered by the host processor, which may also download the programs to be executed if the events occur.
If the storage device is unable to completely address an event that occurs, the storage device may refer the event to the host processor for handling.
Embodiments of the disclosure may include a computational storage device 135 of
As disclosed in some embodiments of the disclosure, Non-Volatile Memory Express (NVMe) technology has built-in capabilities to help understand, predict and prevent Solid State Drive (SSD) failures.
Embodiments of the disclosure may include a framework that may utilize the benefits of this Computational Storage architecture to automate management, monitoring, and tuning processes for NVMe SSDs.
In some embodiments of the disclosure, the framework may be defined as follows. First, a host may download a diagnostic program to a compute module 135 of
An NVMe device may have built-in capabilities to monitor the status and health of SSDs. These capabilities, in various embodiments of the disclosure, may include features such as logging to log all events occurring in the system as well as event and error reporting, including Asynchronous Events, Operation failures, and Rebuild Assistance, among other capabilities. These capabilities, in some embodiments of the disclosure, may help understand where and why things are failing and report when it does happen.
In some embodiments of the disclosure, the log page 630 of
Furthermore, in some embodiments of the disclosure, the SSD events may be grouped into the following event types: Error events; Health Status events; Notice events; NVM Command Set Specific events; and Vendor Specific events.
NVMe computational storage involves, in some embodiments of the disclosure, offloading execution of a program from a host to a controller. The computational storage device 135 of
There may be two categories of programs: downloadable programs which may be loaded and executed on the NVMe controller by the host; and device-defined programs which may be provided by the NVMe controller.
Additionally, controllers of the various embodiments herein may support a subset of one or more program types: for example, Extended Berkeley Packet Filter (eBPF) Executable and Linkable Format (ELF), Program Type, Field Programmable Gate Array (FPGA) Bitstream, and Operating System image type, to name a few. The controller may also work in bare metal mode, where the program type may be specific for that ISA and custom built. All these program types built may additionally be protected by a signature key for security, authenticity and corruptions. In such embodiments of the disclosure, the controller may employ a mechanism to verify the program before any execution.
Embodiments of the disclosure may provide for automated error detection and resolution, and may include vendor programs that understand the data. Furthermore, embodiments of the disclosure may also provide protection from Data loss/corruption. If an event occurs for which reporting is disabled/or there are no Asynchronous Event Request commands outstanding, the host might lose critical data. The proposed solution automates error recovery and thus minimizing data loss, also known as high availability. Additionally, embodiments of the disclosure provide for scalability. In an enterprise server with 50 SSDs, for example, the host may spend most of its CPU resources managing/monitoring the SSDs. Some embodiments of the disclosure may run device management/error recovery within the device or the compute module 135 of
Embodiments of the disclosure may: enable high availability, as automatic recovery from failures may reduce application downtime; reduce the cost of ownership by automating routine tasks; maximize SSD performance, as the diagnostic programs may help predict and prevent SSD errors; and offer a scalable solution, as host CPU resources are freed up.
In embodiments of this disclosure, the programs may be either diagnostic programs or reactive programs. Diagnostic programs may collect relevant information about an event. Reactive programs may include failover, deduplication, etc.
The programs may be executed once, or may run as many times as an event is posted (also known as a persistent program). For persistent execution programs, the program execution may be disabled by issuing a set features command again (in-line with disabling AEN). In some embodiments of the disclosure, a program may be associated with multiple events. Additionally, the programs may clear the events after appropriate event handling is performed (without host intervention).
Embodiments of the disclosure may handle events arising from compute module 135 of
In some embodiments of the disclosure, multiple programs may run in parallel in the compute module 135 of
The programs may maintain state across various runs and may alter execution flow based on the states. For example, a failover program might recover failed Logical Block Addresses (LBAs) on every LBA status information alert. The program might also keep track of the number of failures the device 120 of
Additionally, embodiments of the disclosure may include connecting an FPGA to an SSD via an NVMe connection. Further embodiments of the disclosure may include performing deduplication operations associated with storage by the FPGA.
The following discussion is intended to provide a brief, general description of a suitable machine or machines in which certain aspects of the disclosure may be implemented. The machine or machines may be controlled, at least in part, by input from conventional input devices, such as keyboards, mice, etc., as well as by directives received from another machine, interaction with a virtual reality (VR) environment, biometric feedback, or other input signal. As used herein, the term “machine” is intended to broadly encompass a single machine, a virtual machine, or a system of communicatively coupled machines, virtual machines, or devices operating together. Exemplary machines include computing devices such as personal computers, workstations, servers, portable computers, handheld devices, telephones, tablets, etc., as well as transportation devices, such as private or public transportation, e.g., automobiles, trains, cabs, etc.
The machine or machines may include embedded controllers, such as programmable or non-programmable logic devices or arrays, Application Specific Integrated Circuits (ASICs), embedded computers, smart cards, and the like. The machine or machines may utilize one or more connections to one or more remote machines, such as through a network interface, modem, or other communicative coupling. Machines may be interconnected by way of a physical and/or logical network, such as an intranet, the Internet, local area networks, wide area networks, etc. One skilled in the art will appreciate that network communication may utilize various wired and/or wireless short range or long range carriers and protocols, including radio frequency (RF), satellite, microwave, Institute of Electrical and Electronics Engineers (IEEE) 802.11, Bluetooth®, optical, infrared, cable, laser, etc.
Embodiments of the present disclosure may be described by reference to or in conjunction with associated data including functions, procedures, data structures, application programs, etc. which when accessed by a machine results in the machine performing tasks or defining abstract data types or low-level hardware contexts. Associated data may be stored in, for example, the volatile and/or non-volatile memory, e.g., RAM, ROM, etc., or in other storage devices and their associated storage media, including hard-drives, floppy-disks, optical storage, tapes, flash memory, memory sticks, digital video disks, biological storage, etc. Associated data may be delivered over transmission environments, including the physical and/or logical network, in the form of packets, serial data, parallel data, propagated signals, etc., and may be used in a compressed or encrypted format. Associated data may be used in a distributed environment, and stored locally and/or remotely for machine access.
Embodiments of the disclosure may include a tangible, non-transitory machine-readable medium comprising instructions executable by one or more processors, the instructions comprising instructions to perform the elements of the disclosures as described herein.
The various operations of methods described above may be performed by any suitable means capable of performing the operations, such as various hardware and/or software component(s), circuits, and/or module(s). The software may comprise an ordered listing of executable instructions for implementing logical functions, and may be embodied in any “processor-readable medium” for use by or in connection with an instruction execution system, apparatus, or device, such as a single or multiple-core processor or processor-containing system.
The blocks or steps of a method or algorithm and functions described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a tangible, non-transitory computer-readable medium. A software module may reside in Random Access Memory (RAM), flash memory, Read Only Memory (ROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), registers, hard disk, a removable disk, a CD ROM, or any other form of storage medium known in the art.
Having described and illustrated the principles of the disclosure with reference to illustrated embodiments, it will be recognized that the illustrated embodiments may be modified in arrangement and detail without departing from such principles, and may be combined in any desired manner. And, although the foregoing discussion has focused on particular embodiments, other configurations are contemplated. In particular, even though expressions such as “according to an embodiment of the disclosure” or the like are used herein, these phrases are meant to generally reference embodiment possibilities, and are not intended to limit the disclosure to particular embodiment configurations. As used herein, these terms may reference the same or different embodiments that are combinable into other embodiments.
The foregoing illustrative embodiments are not to be construed as limiting the disclosure thereof. Although a few embodiments have been described, those skilled in the art will readily appreciate that many modifications are possible to those embodiments without materially departing from the novel teachings and advantages of the present disclosure. Accordingly, all such modifications are intended to be included within the scope of this disclosure as defined in the claims.
Embodiments of the disclosure may extend to the following statements, without limitation:
Statement 1. An embodiment of the disclosure includes a storage device, comprising: first storage for a data;
a controller to manage access to the data in the first storage;
a second storage to store a first identifier and a second identifier, the first identifier for an event and the second identifier for a program; and
a processor to receive the event and execute the program based at least in part on the second storage.
Statement 2. An embodiment of the disclosure includes the storage device according to statement 1, wherein the storage device includes a Solid State Drive (SSD).
Statement 3. An embodiment of the disclosure includes the storage device according to statement 2, wherein the SSD includes a Non-Volatile Memory Express (NVMe) SSD.
Statement 4. An embodiment of the disclosure includes the storage device according to statement 1, wherein the second storage includes an event table to store the first identifier and the second identifier.
Statement 5. An embodiment of the disclosure includes the storage device according to statement 1, wherein the processor includes an event framework to receive the event and execute the program based at least in part on the second storage.
Statement 6. An embodiment of the disclosure includes the storage device according to statement 1, further comprising a component to execute the program based at least in part on the processor.
Statement 7. An embodiment of the disclosure includes the storage device according to statement 6, wherein the component is at least one of a Field Programmable Gate Array (FPGA), an Application-Specific Integrated Circuit (ASIC), a central processing unit (CPU), a graphics processing unit (GPU), a general purpose GPU (GPGPU), or a tensor processing unit (TPU).
Statement 8. An embodiment of the disclosure includes the storage device according to statement 1, wherein the processor is configured to receive the event from at least one of the first storage or the controller.
Statement 9. An embodiment of the disclosure includes the storage device according to statement 1, wherein the storage device is configured to receive an association between the first identifier and the second identifier from a host.
Statement 10. An embodiment of the disclosure includes the storage device according to statement 9, wherein the storage device is further configured to store the first identifier and the second identifier in the second storage.
Statement 11. An embodiment of the disclosure includes the storage device according to statement 1, wherein:
the storage device is connected to a host, the host storing the program; and
the storage device is configured to receive the program from the host as a download.
Statement 12. An embodiment of the disclosure includes the storage device according to statement 11, wherein the storage device is configured to receive the program from the host as the download based at least in part on the processor receiving the event.
Statement 13. An embodiment of the disclosure includes the storage device according to statement 1, wherein the program is built-in to the storage device.
Statement 14. An embodiment of the disclosure includes the storage device according to statement 1, wherein the program is at least one of an error recovery program, an error prediction program, a data deduplication program, or a data migration program.
Statement 15. An embodiment of the disclosure includes the storage device according to statement 1, wherein the processor is configured to execute the program on a computational storage unit based at least in part on the second storage.
Statement 16. An embodiment of the disclosure includes the storage device according to statement 15, wherein:
the computational storage unit is external to the storage device; and
the computational storage unit is paired with the storage device.
Statement 17. An embodiment of the disclosure includes the storage device according to statement 15, wherein the storage device includes the computational storage unit.
Statement 18. An embodiment of the disclosure includes the storage device according to statement 15, wherein the program is built-in to the computational storage unit.
Statement 19. An embodiment of the disclosure includes the storage device according to statement 15, wherein:
the computational storage unit is connected to a host, the host storing the program; and
the computational storage unit is configured to receive the program from the host as a download.
Statement 20. An embodiment of the disclosure includes the storage device according to statement 19, wherein the computational storage unit is configured to receive the program from the host as the download based at least in part on the processor receiving the event.
Statement 21. An embodiment of the disclosure includes the storage device according to statement 15, wherein the processor is configured to receive the event from the computational storage unit.
Statement 22. An embodiment of the disclosure includes the storage device according to statement 1, wherein the processor is configured to trigger an asynchronous event notification to a host by the processor based at least in part on the event.
Statement 23. An embodiment of the disclosure includes the storage device according to statement 1, wherein the program includes state information for the storage device.
Statement 24. An embodiment of the disclosure includes the storage device according to statement 23, wherein the program is configured to execute the program based at least in part on an occurrence of the event and the state information.
Statement 25. An embodiment of the disclosure includes a method, comprising:
receiving an event at a processor of a storage device;
identifying a program by the processor based at least in part on an first storage and the event, the first storage associating a first identifier and a second identifier, the first identifier for the event and the second identifier for the program; and
executing the program.
Statement 26. An embodiment of the disclosure includes the method according to statement 25, wherein the storage device includes a Solid State Drive (SSD).
Statement 27. An embodiment of the disclosure includes the method according to statement 26, wherein the SSD includes a Non-Volatile Memory Express (NVMe) SSD.
Statement 28. An embodiment of the disclosure includes the method according to statement 25, wherein the first storage includes an event table to store the first identifier and the second identifier.
Statement 29. An embodiment of the disclosure includes the method according to statement 25, wherein the processor includes an event framework to receive the event and execute the program based at least in part on the first storage.
Statement 30. An embodiment of the disclosure includes the method according to statement 25, wherein receiving the event at the processor of the storage device includes receiving the event at the processor of the storage device from at least one of a second storage of the storage device or a controller of the storage device.
Statement 31. An embodiment of the disclosure includes the method according to statement 25, wherein receiving the event at the processor of the storage device includes receiving the event at the processor of the storage device from a computational storage unit.
Statement 32. An embodiment of the disclosure includes the method according to statement 25, wherein the program is at least one of an error recovery program, an error prediction program, a data deduplication program, or a data migration program.
Statement 33. An embodiment of the disclosure includes the method according to statement 25, wherein executing the program includes executing the program on a component.
Statement 34. An embodiment of the disclosure includes the method according to statement 33, wherein the component is at least one of a Field Programmable Gate Array (FPGA), an Application-Specific Integrated Circuit (ASIC), a central processing unit (CPU), a graphics processing unit (GPU), a general purpose GPU (GPGPU), or a tensor processing unit (TPU).
Statement 35. An embodiment of the disclosure includes the method according to statement 25, wherein executing the program includes executing the program on a computational storage unit.
Statement 36. An embodiment of the disclosure includes the method according to statement 35, wherein:
the computational storage unit is external to the storage device; and
the computational storage unit is paired with the storage device.
Statement 37. An embodiment of the disclosure includes the method according to statement 35, wherein the storage device includes the computational storage unit.
Statement 38. An embodiment of the disclosure includes the method according to statement 35, wherein the program is built into the computational storage unit.
Statement 39. An embodiment of the disclosure includes the method according to statement 25, further comprising downloading the program from a host.
Statement 40. An embodiment of the disclosure includes the method according to statement 39, wherein downloading the program from the host includes downloading the program from the host to the storage device.
Statement 41. An embodiment of the disclosure includes the method according to statement 39, wherein downloading the program from the host includes downloading the program from the host to a computational storage unit.
Statement 42. An embodiment of the disclosure includes the method according to statement 39, wherein downloading the program from the host includes downloading the program from the host based at least in part on receiving the event at the processor of the storage device.
Statement 43. An embodiment of the disclosure includes the method according to statement 25, further comprising receiving an association between the first identifier and the second identifier.
Statement 44. An embodiment of the disclosure includes the method according to statement 43, wherein receiving an association between the first identifier and the second identifier includes storing the first identifier and the second identifier in the first storage.
Statement 45. An embodiment of the disclosure includes the method according to statement 25, wherein the program is built into the storage device.
Statement 46. An embodiment of the disclosure includes the method according to statement 25, further comprising triggering an asynchronous event notification to a host by the processor based at least in part on the event.
Statement 47. An embodiment of the disclosure includes the method according to statement 25, wherein executing the program includes executing the program based at least in part on an occurrence of the event and a state information for the storage device.
Statement 48. An embodiment of the disclosure includes the method according to statement 25, further comprising receiving a result of the program.
Statement 49. An embodiment of the disclosure includes the method according to statement 48, wherein receiving the result of the program includes receiving the result of the program from a component of the storage device.
Statement 50. An embodiment of the disclosure includes the method according to statement 48, wherein receiving the result of the program includes receiving the result of the program from a computational storage unit.
Statement 51. An embodiment of the disclosure includes the method according to statement 48, further comprising triggering an asynchronous event notification to a host by the processor based at least in part on the event and the result of the program.
Statement 52. An embodiment of the disclosure includes an article, comprising a non-transitory storage medium, the non-transitory storage medium having stored thereon instructions that, when executed by a machine, result in:
receiving an event at a processor of a storage device;
identifying a program by the processor based at least in part on an first storage and the event, the first storage associating a first identifier and a second identifier, the first identifier for the event and the second identifier for the program; and
executing the program.
Statement 53. An embodiment of the disclosure includes the article according to statement 52, wherein the storage device includes a Solid State Drive (SSD).
Statement 54. An embodiment of the disclosure includes the article according to statement 53, wherein the SSD includes a Non-Volatile Memory Express (NVMe) SSD.
Statement 55. An embodiment of the disclosure includes the article according to statement 52, wherein the first storage includes an event table to store the first identifier and the second identifier.
Statement 56. An embodiment of the disclosure includes the article according to statement 52, wherein the processor includes an event framework to receive the event and execute the program based at least in part on the first storage.
Statement 57. An embodiment of the disclosure includes the article according to statement 52, wherein receiving the event at the processor of the storage device includes receiving the event at the processor of the storage device from at least one of a second storage of the storage device or a controller of the storage device.
Statement 58. An embodiment of the disclosure includes the article according to statement 52, wherein receiving the event at the processor of the storage device includes receiving the event at the processor of the storage device from a computational storage unit.
Statement 59. An embodiment of the disclosure includes the article according to statement 52, wherein the program is at least one of an error recovery program, an error prediction program, a data deduplication program, or a data migration program.
Statement 60. An embodiment of the disclosure includes the article according to statement 52, wherein executing the program includes executing the program on a component.
Statement 61. An embodiment of the disclosure includes the article according to statement 60, wherein the component is at least one of a Field Programmable Gate Array (FPGA), an Application-Specific Integrated Circuit (ASIC), a central processing unit (CPU), a graphics processing unit (GPU), a general purpose GPU (GPGPU), or a tensor processing unit (TPU).
Statement 62. An embodiment of the disclosure includes the article according to statement 52, wherein executing the program includes executing the program on a computational storage unit.
Statement 63. An embodiment of the disclosure includes the article according to statement 62, wherein:
the computational storage unit is external to the storage device; and
the computational storage unit is paired with the storage device.
Statement 64. An embodiment of the disclosure includes the article according to statement 62, wherein the storage device includes the computational storage unit.
Statement 65. An embodiment of the disclosure includes the article according to statement 62, wherein the program is built into the computational storage unit.
Statement 66. An embodiment of the disclosure includes the article according to statement 52, wherein the non-transitory storage medium has stored thereon further instructions that, when executed by the machine, result in downloading the program from a host.
Statement 67. An embodiment of the disclosure includes the article according to statement 66, wherein downloading the program from the host includes downloading the program from the host to the storage device.
Statement 68. An embodiment of the disclosure includes the article according to statement 66, wherein downloading the program from the host includes downloading the program from the host to a computational storage unit.
Statement 69. An embodiment of the disclosure includes the article according to statement 66, wherein downloading the program from the host includes downloading the program from the host based at least in part on receiving the event at the processor of the storage device.
Statement 70. An embodiment of the disclosure includes the article according to statement 52, wherein the non-transitory storage medium has stored thereon further instructions that, when executed by the machine, result in receiving an association between the first identifier and the second identifier.
Statement 71. An embodiment of the disclosure includes the article according to statement 70, wherein receiving an association between the first identifier and the second identifier includes storing the first identifier and the second identifier in the first storage.
Statement 72. An embodiment of the disclosure includes the article according to statement 52, wherein the program is built into the storage device.
Statement 73. An embodiment of the disclosure includes the article according to statement 52, wherein the non-transitory storage medium has stored thereon further instructions that, when executed by the machine, result in triggering an asynchronous event notification to a host by the processor based at least in part on the event.
Statement 74. An embodiment of the disclosure includes the article according to statement 52, wherein executing the program includes executing the program based at least in part on an occurrence of the event and a state information for the storage device.
Statement 75. An embodiment of the disclosure includes the article according to statement 52, wherein the non-transitory storage medium has stored thereon further instructions that, when executed by the machine, result in receiving a result of the program.
Statement 76. An embodiment of the disclosure includes the article according to statement 75, wherein receiving the result of the program includes receiving the result of the program from a component of the storage device.
Statement 77. An embodiment of the disclosure includes the article according to statement 75, wherein receiving the result of the program includes receiving the result of the program from a computational storage unit.
Statement 78. An embodiment of the disclosure includes the article according to statement 75, wherein the non-transitory storage medium has stored thereon further instructions that, when executed by the machine, result in triggering an asynchronous event notification to a host by the processor based at least in part on the event and the result of the program.
Consequently, in view of the wide variety of permutations to the embodiments described herein, this detailed description and accompanying material is intended to be illustrative only, and should not be taken as limiting the scope of the disclosure. What is claimed as the disclosure, therefore, is all such modifications as may come within the scope and spirit of the following claims and equivalents thereto.
This application claims the benefit of U.S. Provisional Patent Application Ser. No. 63/209,928, filed Jun. 11, 2021, which is incorporated by reference herein for all purposes.
Number | Date | Country | |
---|---|---|---|
63209928 | Jun 2021 | US |