US20230080984A1 - Metadata storage for placeholders in a storage virtualization system - Google Patents
Metadata storage for placeholders in a storage virtualization system Download PDFInfo
- Publication number
- US20230080984A1 US20230080984A1 US17/991,000 US202217991000A US2023080984A1 US 20230080984 A1 US20230080984 A1 US 20230080984A1 US 202217991000 A US202217991000 A US 202217991000A US 2023080984 A1 US2023080984 A1 US 2023080984A1
- Authority
- US
- United States
- Prior art keywords
- file
- blob
- storage
- placeholder
- storage virtualization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000004044 response Effects 0.000 claims abstract description 12
- 238000000034 method Methods 0.000 claims description 71
- 230000000153 supplemental effect Effects 0.000 claims description 4
- 230000000717 retained effect Effects 0.000 claims 1
- 230000008569 process Effects 0.000 description 24
- 238000012545 processing Methods 0.000 description 11
- 238000004891 communication Methods 0.000 description 9
- 101150071434 BAR1 gene Proteins 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000006835 compression Effects 0.000 description 4
- 238000007906 compression Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000036571 hydration Effects 0.000 description 2
- 238000006703 hydration reaction Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000018044 dehydration Effects 0.000 description 1
- 238000006297 dehydration reaction Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000012804 iterative process Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000009966 trimming Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
- G06F16/164—File meta data generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/13—File access structures, e.g. distributed indices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/188—Virtual file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0662—Virtualisation aspects
- G06F3/0665—Virtualisation aspects at area level, e.g. provisioning of virtual or logical volumes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Definitions
- cloud storage the data of a file or directory is stored “in the cloud” rather than on a user's local computing device. When the data for a file or directory is needed, it can be pulled “from the cloud” back onto the user's local computing device.
- a component located on a computing device such as an indexer, may be configured to index properties associated with the files and to store these properties as metadata with the file.
- indexer a component located on a computing device
- the data of a file may be stored remotely, such as on a network (i.e., in the cloud), and access to the data of the file by applications, modules, or components of a local computing device may be handled by a storage virtualization provider executing on the local computing device that is configured to retrieve the remotely stored data of the file as needed.
- a storage virtualization filter of the file system of the computing device may store a placeholder for the file on secondary storage of the computing device.
- the placeholder for the file may comprise a sparse data stream containing none or some of the data of the file and information which enables the remotely stored data of the file to be retrieved from the network, as needed.
- the placeholder may not actually hold any of the data of the file, the placeholder may appear to applications running on the computing device as if the complete file was stored on the secondary storage. But because some or all of the data for the file is stored remotely and is not present on the local computing device, certain applications or components on the local computing device that might otherwise generate metadata for the file—such as an indexer—cannot do so because not all of the data of the file resides on the local computing device.
- the file system may need to rely on the storage virtualization provider to generate metadata associated with the file, since the storage virtualization provider manages the full file (i.e., all of its data) on remote storage.
- Disclosed herein are methods and apparatus that enable applications or other entities on a local computing device, such as a storage virtualization provider, to request that metadata for a remotely stored file be stored in association with the file on the local computing device.
- a storage virtualization filter of the file system on the local computing device stores the metadata within the placeholder for the file on the secondary storage of the computing device.
- the file system may store the metadata as a Binary Large Object (BLOB) in a secondary data stream of the placeholder for the file.
- BLOB Binary Large Object
- FIG. 1 illustrates an exemplary computing device, in which the aspects disclosed herein may be employed
- FIG. 2 illustrates an example architecture for storage virtualization in accordance with one embodiment
- FIG. 3 A illustrates a regular file, in accordance with one embodiment
- FIG. 3 B illustrates a placeholder for a file, in accordance with one embodiment
- FIG. 3 C illustrates a reparse point for a placeholder for a file
- FIG. 4 illustrates further details of an architecture for storage virtualization in accordance with one embodiment
- FIG. 5 illustrates a process of creating a placeholder for a file, in accordance with one embodiment
- FIG. 6 illustrates a process of accessing file data for a placeholder, in accordance with one embodiment
- FIG. 7 A illustrates example details of the file data access process of FIG. 6 ;
- FIG. 7 B illustrates additional example details of the file data access process of FIG. 6 ;
- FIG. 8 A illustrates a regular directory, in accordance with one embodiment
- FIG. 8 B illustrates a placeholder for a directory, in accordance with one embodiment
- FIG. 8 C illustrates a reparse point for a directory placeholder, in accordance with one embodiment
- FIG. 9 illustrates a process for enumeration of a placeholder directory, in accordance with one embodiment
- FIG. 10 is a diagram of an example directory hierarchy
- FIG. 11 illustrates a process for storing metadata in a secondary data stream of a placeholder for a file
- FIG. 12 shows an example secondary data stream
- FIG. 13 illustrates a process for creating and storing a Binary Large Object (BLOB).
- BLOB Binary Large Object
- a file system executing on a computing device may receive, from a storage virtualization provider or from another application, module, or component, a request to store metadata associated with the file. And in response to this request, the file system may store the metadata as a Binary Large Object (BLOB) in a secondary data stream of the placeholder for the file.
- BLOB Binary Large Object
- FIG. 1 illustrates an example computing device 112 in which the techniques and solutions disclosed herein may be implemented or embodied.
- the computing device 112 may be any one of a variety of different types of computing devices, including, but not limited to, a computer, personal computer, server, portable computer, mobile computer, wearable computer, laptop, tablet, personal digital assistant, smartphone, digital camera, or any other machine that performs computations automatically.
- the computing device 112 includes a processing unit 114 , a system memory 116 , and a system bus 118 .
- the system bus 118 couples system components including, but not limited to, the system memory 116 to the processing unit 114 .
- the processing unit 114 may be any of various available processors. Dual microprocessors and other multiprocessor architectures also may be employed as the processing unit 114 .
- the system bus 118 may be any of several types of bus structure(s) including a memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, Industry Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Card Bus, Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), Firewire (IEEE 1394), and Small Computer Systems Interface (SCSI).
- ISA Industry Standard Architecture
- MSA Micro-Channel Architecture
- EISA Extended ISA
- IDE Intelligent Drive Electronics
- VLB VESA Local Bus
- PCI Peripheral Component Interconnect
- Card Bus Universal Serial Bus
- USB Universal Serial Bus
- AGP Advanced Graphics Port
- PCMCIA Personal Computer Memory Card International Association bus
- Firewire IEEE 1394
- SCSI Small Computer Systems
- the system memory 116 includes volatile memory 120 and nonvolatile memory 122 .
- the basic input/output system (BIOS) containing the basic routines to transfer information between elements within the computing device 112 , such as during start-up, is stored in nonvolatile memory 122 .
- nonvolatile memory 122 may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory.
- Volatile memory 120 includes random access memory (RAM), which acts as external cache memory.
- RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
- SRAM synchronous RAM
- DRAM dynamic RAM
- SDRAM synchronous DRAM
- DDR SDRAM double data rate SDRAM
- ESDRAM enhanced SDRAM
- SLDRAM Synchlink DRAM
- DRRAM direct Rambus RAM
- Computing device 112 also may include removable/non-removable, volatile/non-volatile computer-readable storage media, which may be referred to herein as secondary storage.
- FIG. 1 illustrates secondary storage, for example, in the form of a disk storage 124 .
- Secondary storage (e.g., disk storage) 124 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS-100 drive, memory card (such as an SD memory card), or memory stick.
- disk storage 124 may include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM).
- an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM).
- CD-ROM compact disk ROM device
- CD-R Drive CD recordable drive
- CD-RW Drive CD rewritable drive
- DVD-ROM digital versatile disk ROM drive
- interface 126 a removable or non-removable interface
- the terms disk storage and secondary storage may be used interchangeably herein.
- FIG. 1 further depicts software that acts as an intermediary between users and the basic computer resources described in the computing device 112 .
- Such software includes an operating system 128 .
- Operating system 128 which may be stored on disk storage 124 , acts to control and allocate resources of the computing device 112 .
- Applications 130 take advantage of the management of resources by operating system 128 through program modules 132 and program data 134 stored either in system memory 116 or on disk storage 124 . It is to be appreciated that the aspects described herein may be implemented with various operating systems or combinations of operating systems.
- the operating system 128 includes a file system 129 for storing and organizing, on the disk storage 124 , computer files and the data they contain to make it easy to find and access them.
- a user may enter commands or information into the computing device 112 through input device(s) 136 .
- Input devices 136 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to the processing unit 114 through the system bus 118 via interface port(s) 138 .
- Interface port(s) 138 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB).
- Output device(s) 140 use some of the same type of ports as input device(s) 136 .
- a USB port may be used to provide input to computing device 112 , and to output information from computing device 112 to an output device 140 .
- Output adapter 142 is provided to illustrate that there are some output devices 140 like monitors, speakers, and printers, among other output devices 140 , which require special adapters.
- the output adapters 142 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between the output device 140 and the system bus 118 . It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 144 .
- Computing device 112 may operate in a networked environment using logical connections to one or more remote computing devices, such as remote computing device(s) 144 .
- the remote computing device(s) 144 may be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device, another computing device identical to the computing device 112 , or the like, and typically includes many or all of the elements described relative to computing device 112 .
- only a memory storage device 146 is illustrated with remote computing device(s) 144 .
- Remote computing device(s) 144 is logically connected to computing device 112 through a network interface 148 and then physically connected via communication connection 150 .
- Network interface 148 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN).
- LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet, Token Ring and the like.
- WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL).
- ISDN Integrated Services Digital Networks
- DSL Digital Subscriber Lines
- Communication connection(s) 150 refers to the hardware/software employed to connect the network interface 148 to the bus 118 . While communication connection 150 is shown for illustrative clarity inside computing device 112 , it may also be external to computing device 112 .
- the hardware/software necessary for connection to the network interface 148 includes, for exemplary purposes only, internal and external technologies such as modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards.
- a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- an application running on a server and the server may be a component.
- One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
- a placeholder may be created on a local computing device for a file or directory.
- the placeholder appears to a user or application as a regular file or directory on the computing device. That is, an application can issue I/O calls on the file or directory as if the file or directory was stored locally, but the placeholder may not contain all the data of the file or directory.
- FIG. 2 is a block diagram illustrating the components of an architecture for implementing the storage virtualization techniques described herein, in accordance with one embodiment.
- the architecture comprises: a user-mode storage virtualization provider module 202 responsible for retrieving remotely stored file and directory data from a network 208 (e.g., “from the cloud”); a file system filter 204 , referred to herein as a storage virtualization filter, that creates and manages placeholders for files and directories and notifies the user-mode storage virtualization provider of access attempts to files or directories whose data is managed by the filter 204 and provider 202 ; a user-mode library 206 that abstracts many of the details of provider-filter communication; and a shell component 210 that serves as an interface for access to the file system 129 by an application 130 and the storage virtualization provider 202 .
- the storage virtualization provider 202 runs in user-mode in the illustrated embodiment of FIG. 2 , in other embodiments the storage virtualization provider 202 could be a kernel-mode component.
- the disclosed architecture is not limited to the user-mode embodiment described herein.
- the user-mode storage virtualization provider module 202 may be implemented (e.g., programmed) by a developer of a remote storage service or entity that provides remote storage services to computing device users. Examples of such remote storage services, sometimes also referred to as cloud storage services, include Microsoft OneDrive and similar services. Thus, there may be multiple different storage virtualization providers, each for a different remote storage service.
- the storage virtualization provider module 202 interfaces with the storage virtualization filter 204 via application programming interfaces (APIs) defined and implemented by the user mode library 206 .
- APIs application programming interfaces
- the storage virtualization provider module 202 implements the intelligence and functionality necessary to store and fetch file or directory data to/from a remote storage location (not shown) on the network 208 .
- the user-mode library 206 abstracts many of the details of communication between the storage virtualization filter 204 and the storage virtualization provider 202 . This may make implementing a storage virtualization provider 202 easier by providing APIs that are simpler and more unified in appearance than calling various file system APIs directly. The APIs are intended to be redistributable and fully documented for third party's to develop storage virtualization providers for their remote storage services. Also, by implementing such a library 206 , underlying provider-filter communication interfaces may be changed without breaking application compatibility.
- the storage virtualization techniques described herein may be applied to both files and directories in a computing device.
- the operation of these storage virtualization techniques on files will be explained first, followed by an explanation of the operation of these techniques on directories.
- a file may begin either as a regular file or as a placeholder.
- FIG. 3 A illustrates an example of a regular file 300 .
- a regular file typically contains metadata 302 about the file (e.g., attributes, time stamps, etc.), a primary data stream 304 that holds the data of the file, and optionally one or more secondary data streams 306 .
- metadata 302 about the file (e.g., attributes, time stamps, etc.)
- primary data stream 304 that holds the data of the file
- optionally one or more secondary data streams 306 optionally one or more secondary data streams
- a placeholder 308 comprises: metadata 310 for a file, which may be identical to the metadata 302 of a regular file 300 ; a sparse primary data stream 312 which may contain none or some data of the file (the rest of the data being stored remotely by a remote storage provider); information 314 which enables the remotely stored data for the file to be retrieved; and optionally one or more secondary data streams 316 . Because all or some of the data for a file represented by a placeholder 308 is not stored as a primary data stream in the file, the placeholder 308 may consume less space in the local storage of a computing device. Note that a placeholder can at times contain all of the data of the file (for example because all of it was fetched), but as a placeholder, it is still managed by the storage virtualization filter 204 and storage virtualization provider 202 as described herein.
- the information 314 which enables the remotely stored data for the file to be retrieved comprises a reparse point 314 .
- a reparse point is a data structure comprising a tag 322 and accompanying data 324 .
- the tag 322 is used to associate the reparse point with a particular file system filter in the file system stack of the computing device.
- the tag identifies the reparse point as being associated with the storage virtualization filter 204 .
- the data 324 of the reparse point 314 may comprise a globally unique identifier (GUID) associated with the storage virtualization provider 202 —to identify the storage virtualization provider 202 as the provider for the actual file data for the placeholder.
- the data 324 may comprise an identifier of the file itself, such as a file name or other file identifier.
- placeholders do not contain any of the file data. Rather, when there is a request to access the data of a file represented by the placeholder, the storage virtualization filter 204 must work with the storage virtualization provider 202 to fetch all of the file data, effectively restoring the full contents of the file on the local storage medium 124 .
- partial fetches of data are enabled.
- some extents of the primary data stream of a file may be stored locally as part of the placeholder, while other extents are stored and managed remotely by the storage virtualization provider 202 .
- the data 324 of the reparse point of a placeholder may contain a data structure, such as an “on-disk” bitmap, that identifies extents (i.e.
- such an on-disk bitmap may comprise a sequence of bits, where each bit represents one 4 KB chunk of the file. In other embodiments, each bit may represent a different size chunk of data. In one embodiment, a bit is set if the corresponding chunk is already present in the local storage.
- the storage virtualization filter 204 examines the on-disk bitmap to determine what parts of the file, if any, are not present on the local storage. For each range of a file that is not present, the storage virtualization filter 204 will then request the virtualization provider 202 to fetch those ranges from the remote storage.
- FIG. 4 is a block diagram of the storage virtualization architecture of FIG. 2 , as embodied in a computing device that implements the Microsoft Windows operating system and in which the file system 129 comprises the Microsoft NTFS file system. It is understood that the architecture illustrated in FIG. 4 is just one example, and the aspects of the storage virtualization solution described herein are in no way limited to implementation in this example environment. Rather, the aspects disclosed herein may be implemented in any suitable operating system and file system environment.
- an application 130 may perform file operations (e.g., create, open, read, write) by invoking an appropriate I/O call via the Win32 API 402 of the Windows operating system. These I/O calls will then be passed to an I/O Manager 404 in the kernel space of the operating system. The I/O Manager will pass the I/O call to the file system's stack, which may comprise one or more file system filters. Initially, the call will pass through these filters to the file system 129 itself. In the case of Microsoft's NTFS reparse point technology, if the file system accesses a file on disk 124 that contains a reparse point data structure, the file system will pass the I/O request back up to the stack 406 .
- file operations e.g., create, open, read, write
- a file system filter that corresponds to the tag (i.e., globally unique identifier) of the reparse point will recognize the I/O as relating to a file whose access is to be handled by that filter.
- the filter will process the I/O and then pass the I/O back to the file system for proper handling as facilitated by the filter.
- the file system will pass the I/O request back up the stack to the storage virtualization filter 204 , which will handle the I/O request in accordance with the methods described hereinafter.
- FIG. 5 is a flow diagram illustrating the steps performed by the storage virtualization filter 204 in order to create a placeholder for a file, in accordance with the example architecture illustrated in FIG. 4 .
- the process may be initiated by the storage virtualization provider 202 , which may call a CreatePlaceholders function of the user-mode library 206 to do so.
- the library 206 will, in turn, convert that call into a corresponding CreatePlaceholders message to the storage virtualization filter 204 , which will receive that message in step 502 of FIG. 5 .
- the storage virtualization filter 204 will create a 0-length file that serves as the placeholder, as shown at step 504 .
- the CreatePlaceholders message will contain a file name for the placeholder, given by the storage virtualization provider 202 .
- the storage virtualization filter 204 will mark the 0-length file as a sparse file. In one embodiment, this may be done by setting an attribute of the metadata of the placeholder.
- a file that is marked as a sparse file will be recognized by the underlying file system as containing a sparse data set—typically all zeros. The file system will respond by not allocating hard disk drive space to the file (except in regions where it might contain nonzero data).
- the storage virtualization filter 204 will set the primary data stream length of the file to a value given by the storage virtualization provider 202 in the CreatePlaceholders message.
- the storage virtualization filter 204 sets any additional metadata for the placeholder file, such as time stamps, access control lists (ACLs), and any other metadata supplied by the storage virtualization provider 202 in the CreatePlaceholders message.
- the storage virtualization filter 204 sets the reparse point and stores it in the placeholder file. As described above in connection with FIG.
- the reparse point comprises a tag associating it with the storage virtualization filter 204 and data, which may include an identifier of the storage virtualization provider 202 that requested the placeholder, the file name or other file identifier given by the storage virtualization provider 202 , and an on-disk bitmap or other data structure that identifies whether the placeholder contains any extents of the file data.
- the placeholder will appear to a user or application (e.g., application(s) 130 ) as any other file stored locally on the computing device. That is, the details of the remote storage of the file data is effectively hidden from the applications(s).
- application(s) 130 e.g., application(s) 130
- an application In order for an application to issue I/O requests on a file, the application typically must first request the file system to open the file.
- an application will issue a CreateFile call with the OPEN_EXISTING flag set via the Win32 API.
- This request to open the file will flow down through the file system stack 406 to the file system 129 .
- the file system 129 will detect the presence of the reparse point in the file and will send the request back up the stack 406 where it will be intercepted by the storage virtualization filter 204 .
- the storage virtualization filter 204 will perform operations necessary to open the file and will then reissue the request to the file system 129 in a manner that allows the file system to complete the file open operation.
- the file system will then return a handle for the opened file to the requesting application.
- the application 130 may then issue I/O calls (e.g., read, write, etc.) on the file.
- FIG. 6 is a flow diagram illustrating a method for processing an I/O request to read all or a portion of a file represented by a placeholder, in accordance with one embodiment.
- a request to read a file represented by a placeholder may come from an application 130 via the Win32 API 402 in the form of a ReadFile call.
- the ReadFile call will be received by the storage virtualization filter 204 .
- the storage virtualization filter 204 will determine whether the requested range of data for the file is present in the placeholder or whether it is stored remotely by the storage virtualization provider 202 . This determination may be made by examining the on-disk bitmap stored as part of the data of the reparse point for the placeholder.
- the storage virtualization filter 204 determines that the requested range of data is stored locally (for example, because it was fetched from remote storage in connection with a prior I/O request), then in step 606 the storage virtualization filter 204 will pass the ReadFile call to the file system 129 for normal processing. The file system will then return the data to the requesting application.
- the storage virtualization filter 204 must formulate one or more GetFileData requests to the storage virtualization provider 202 to fetch the required data. Reads typically result in partial fetches, while some data-modifying operations may trigger fetching of the full file. Once the desired fetch range is determined, the storage virtualization filter 204 must decide whether to generate a GetFileData request for all, some, or none of the range. Preferably, the filter tries to generate a GetFileData for a particular range only once.
- FIG. 7 A illustrates this functionality.
- a second ReadFile request (“ReadFile 2”) overlaps a prior request (“ReadFile 1”). So, the storage virtualization filter 204 trims the request range of the GetFileData request that it generates to the storage virtualization provider 202 .
- a third ReadFile request (“ReadFile 3”) is fully encompassed by the two prior requests, so there is no need for the filter 204 to fetch data to satisfy that request. All the data requested by ReadFile 3 will have already been fetched in response to the previous two requests.
- the storage virtualization filter 204 determines whether any portion of the remotely stored data it needs to retrieve (i.e., the data for which it has determined one or more GetFileData requests is needed) has previously been requested from the storage virtualization provider 202 but not yet received, and then if so, it trims any new requests to the storage virtualization provider so that they do not overlap with any such previously requested but not yet received data.
- the storage virtualization filter 204 may determine which ranges of file data need to be requested from the storage virtualization provider 202 by examining the on-disk bitmap that, in one embodiment, is maintained as part of the data of the reparse point of the placeholder.
- the bitmap is depicted as the middle rectangle in the diagram. Ranges of the file that are already stored on disk are indicated by the hatched spaces in the bitmap.
- each bit of the bitmap may indicate the status of a corresponding range (e.g., each bit may represent a corresponding 4 KB range) of the file represented by the placeholder. As illustrated in FIG.
- the storage virtualization filter 204 is able to determine which data can be read from disk and which data is needed from the storage virtualization provider 202 .
- the bottom rectangle illustrates the result of comparing the ReadFile request with the on-disk bitmap. The regions the filter will read from disk are indicated, as are the regions the filter will need to obtain from the provider 202 .
- the storage virtualization filter 204 may also maintain a tree of in-flight GetFileData requests for each file. Each entry in the tree records the offset and length of data the filter has requested from the provider and not yet received. The tree may be indexed by the file offset. For each region the filter 204 determines is not yet present, the filter 204 may consult the in-flight tree to determine whether any of the regions it may need have already been requested. This may result in further splitting of the GetFileData requests. Once the filter has determined the final set of GetFileData requests it needs to send, it may insert the GetFileData requests into the in-flight tree and sends them to the provider 202 .
- the storage virtualization filter 204 will issue any necessary GetFileData requests to the storage virtualization provider 202 in step 608 .
- the user-mode library incorporated in the storage virtualization provider 202 will invoke a corresponding GetFileData callback function implemented by the storage virtualization provider 202 .
- the storage virtualization provider 202 will then perform operations necessary to retrieve the requested data from remote storage on the network.
- the storage virtualization provider 202 will then return the data to the library 206 , and in step 610 , the requested file data is returned to the storage virtualization filter 204 .
- the storage virtualization filter issues a WriteFile request to the file system 129 requesting that the fetched data be written to the data stream of the placeholder. Then, in step 614 , the storage virtualization filter 204 will update the on-disk bitmap to indicate that the particular range(s) of data now resides on disk. Note that in one embodiment, the storage virtualization filter 204 makes a distinction between unmodified resident data and modified resident data, and this distinction can potentially help with differential syncing of resident and remote data.
- the storage virtualization filter 204 may return the requested data to the application 130 directly, without storing the data on disk. This may be advantageous in situations where disk space is already limited. This feature may also be used to implement a form of data streaming from the remote storage to the requesting application.
- the storage virtualization filter 204 may also initiate and manage the conversion of a regular file to a placeholder.
- a placeholder will be created for the file as described above, and the data of the primary data stream of the regular file will be sent to the storage virtualization provider 202 for remote storage on the network.
- the method of converting a regular file to a placeholder and moving its primary data stream data to remote storage may be referred to as “dehydration,” and the method of fetching the remotely stored data of a placeholder from remote storage and writing it back to disk may be referred to as “hydration.”
- a directory typically comprises metadata 802 which provides various information about the directory, such as the name of the directory, its length, time of creation, and other information useful to the file system or an application.
- the directory will also contain one or more child directory entries 804 . Each child entry may represent a file within the directory or a subdirectory of the directory.
- a child entry for a file may contain a field that stores attributes associated with the file (such as whether the file is “read only” or “hidden”), a field that stores characters of a file name for the file, one or more fields storing information indicating the date and time of file creation, a field indicating a size of the file, and a field indicating a starting location (e.g., starting cluster) on the storage medium where the data for the file resides.
- attributes associated with the file such as whether the file is “read only” or “hidden”
- a field that stores characters of a file name for the file one or more fields storing information indicating the date and time of file creation, a field indicating a size of the file, and a field indicating a starting location (e.g., starting cluster) on the storage medium where the data for the file resides.
- a child entry for a subdirectory may comprise similar fields for the file representing the subdirectory.
- a directory is part of a larger hierarchy of directories. The top
- a placeholder may be created for a directory.
- FIG. 8 B illustrate an example placeholder for a directory.
- the placeholder may comprise a file containing: metadata 808 , which may include some or all of the metadata 802 of a full directory; none, some, or all child entries 810 of the directory; and information 812 which enables any remotely stored child entries for the directory to be retrieved. Because all or some of the child entries for a directory represented by placeholder directory 806 may not be stored in the directory on secondary storage (e.g., disk 124 ), the placeholder directory 806 may consume less space in the local storage of a computing device.
- the information 812 which enables the remotely stored child entries for the directory to be retrieved comprises a reparse point 814 .
- the reparse point 814 is a data structure comprising a tag 816 and accompanying data 818 .
- the tag is used to associate the reparse point with a particular file system filter in the file system stack of the computing device.
- the tag identifies the reparse point as being associated with the storage virtualization filter 204 .
- the data 818 of the reparse point 814 may comprise a globally unique identifier associated with the storage virtualization provider 202 —to identify the storage virtualization provider 202 as the provider for the actual child entries for the placeholder directory.
- the data 818 may comprise an identifier of the directory itself, such as a directory name or other directory identifier.
- a storage virtualization provider 202 that is maintaining a full directory hierarchy on remote storage over a network may request that a placeholder be created for a directory.
- the storage virtualization provider 202 may initially request creation of a placeholder only for the root directory in a remotely stored directory hierarchy. Then, when an application begins to enumerate that directory, the storage virtualization provider 202 may request the creation of additional placeholders for the child directories (i.e., subdirectories) and/or the files under the root directory.
- the phrase “enumerate a directory” and the like refers to a process by which the contents of a directory, including any files or subdirectories (each of which is represented in the directory by one or more respective child entries), may be examined or retrieved (such as in the form a directory listing) upon request to the file system of a computing device.
- the storage virtualization provider 202 can request the creation of a placeholder for a directory, for example, by calling a CreatePlaceholders function of the user-mode library 206 .
- the library 206 will, in turn, convert that call into a corresponding CreatePlaceholders message to the storage virtualization filter 502 .
- the storage virtualization filter 204 will create an empty directory (i.e., an empty file) that serves as the placeholder for the directory.
- the storage virtualization filter 204 may then store in the placeholder directory any additional metadata associated with the directory, such as time stamps, access control lists (ACLs), and other metadata supplied by the storage virtualization provider 202 in the CreatePlaceholders message.
- ACLs access control lists
- the storage virtualization filter 204 will then add to the placeholder information which enables any remotely stored child entries of the directory to be retrieved from remote storage.
- this information may comprise a reparse point.
- the reparse point comprises a tag associating it with the storage virtualization filter 204 and data, which may include an identifier of the storage virtualization provider 202 that requested the placeholder and the directory name or other directory identifier given by the storage virtualization provider 202 .
- the placeholder will appear to a user or application (e.g., application(s) 130 ) as a directory stored locally on the computing device. That is, the details of the remote storage of the directory is effectively hidden from the applications(s).
- application(s) 130 e.g., application(s) 130
- FIG. 9 illustrates the steps performed by the storage virtualization filter 204 for directory enumeration, in accordance with one embodiment.
- An application will typically initiate directory enumeration via, for example, a Win32 API call requiring the directory to be enumerated, such as a request to list the contents of the directory or a request to access a file having the directory in its directory path.
- this I/O call or request will be passed to the file system 129 , which, in the embodiment illustrated herein, will detect the reparse point in the directory placeholder and pass the I/O call back up the file system stack to the storage virtualization filter 204 for processing.
- the storage virtualization filter 204 will begin the process at step 902 by issuing a StartDirectoryEnumeration command to the storage virtualization provider 202 .
- the storage virtualization provider 202 Upon receiving this command, the storage virtualization provider 202 will establish a context that can be used throughout a set of enumeration requests for the directory.
- the StartDirectoryEnumeration command will include the pathname from the root of the remotely stored directory hierarchy to the directory to be enumerated.
- the storage virtualization filter will issue a GetDirectoryEntries command to the storage virtualization provider 202 to request that the storage virtualization provider 202 fetch (i.e., retrieve) all or some range (e.g., 1 to N) of child directory entries of the directory from the remote storage.
- the first GetDirectoryEntries command may include a search string, and the storage virtualization provider 202 may only fetch the directory entries that match this search string.
- the search string could be a full file name, e.g. foo.txt or a wild card name, e.g. foo*.
- the library 206 will invoke a corresponding callback function implemented by the storage virtualization provider 202 , which will cause the storage virtualization provider 202 to fetch the requested entries from the remote storage and return them to the storage virtualization filter 204 .
- the storage virtualization filter 204 receives the fetched directory entries from the storage virtualization provider 202 . The received entries may then be returned to the requesting application or other entity that may have triggered the enumeration.
- the child entries received in step 908 may be written to the placeholder for the directory on the secondary storage (e.g., storage 124 ) of the computing device. This may result in a partial representation of the directory on the secondary storage. On subsequent enumerations, this may result in faster processing, as the child entries needed to satisfy a subsequent enumeration may actually be stored locally on the secondary storage within the placeholder of the enumerated directory.
- the secondary storage e.g., storage 124
- the storage virtualization filter 204 may respond to a subsequent enumeration request for the directory by enumerating both the locally stored child entries and the remotely stored child entries and then merging the results before returning the enumerated entries to the requesting application.
- the locally stored child entries may take precedence over the child entries retrieved from remote storage. That is, if there are versions of the same child entry in both the local storage (e.g., within the directory placeholder on the secondary storage) and in the remotely stored representation of the directory, the locally stored version will be returned to the requesting application instead of the version retrieved from remote storage.
- a policy may be established by which the child entries retrieved from remote storage take precedence over any locally stored child entries.
- the storage virtualization filter 204 may end the enumeration process by issuing a EndDirectoryEnumeration command to the storage virtualization provider 202 , and upon receiving this command, the storage virtualization provider 202 will free any resource(s), e.g. memory or opened handles, used during the process.
- the storage virtualization provider 202 may initially request creation of a placeholder directory only for the root directory in a remotely stored directory hierarchy. Then, when an application begins to enumerate that directory, the storage virtualization provider 202 may request the creation of additional placeholders for the child subdirectories and/or the files under the root. Alternatively, the storage virtualization filter 204 may decide whether to create additional placeholders for the child subdirectories and/or the files under the root. For example, the remotely stored directory hierarchy maintained by the storage virtualization provider 202 on remote storage may have the hierarchy illustrated in FIG. 10 .
- the example hierarchy has a root directory called “foo,” which contains files “1.txt,” “2.txt,” “3.txt” and a subdirectory called “bar.”
- the storage virtualization provider 202 may also then request the storage virtualization filter 204 to create placeholders for each of the files 1.txt, 2.txt, and 3.txt and for the subdirectory bar.
- the on-disk representation of the directory hierarchy will include the directory foo, and the placeholders for 1.txt, 2.txt, and 3.txt and the subdirectory bar.
- the remotely stored virtualized directory hierarchy further includes a file with the path foo ⁇ bar ⁇ foo1 ⁇ bar1 ⁇ 5.txt and that an application requests that file.
- the storage virtualization filter 204 will need to fetch and create placeholders for each of the additional subdirectories foo1 and bar1 as well as the file 5.txt.
- the storage virtualization filter 204 can request this all at once or it can be requested in an iterative process.
- the storage virtualization filter 204 may attach a reparse processing flag to the request so that when the application's request for that file reaches the file system, if the last component of the partial on-disk directory hierarchy representation (“bar” in the example) contains the reparse point tag of the storage virtualization filter 204 , the file system will complete the request with STATUS_REPARSE.
- the virtualization filter In the virtualization filter's handler to this status code, it issues a GetPlaceholderInformation command to the storage virtualization provider 202 with the name of the next component relative to the virtualization root, e.g., bar ⁇ foo1 in the present example.
- the storage virtualization provider 202 Upon receiving this command, the storage virtualization provider 202 checks if the requested path exists in the remote storage, and if yes, the virtualization provider 202 returns to the storage virtualization filter 204 the information necessary to create a placeholder for foo1.
- the storage virtualization filter 204 will then create a file named foo1 under the foo ⁇ bar ⁇ folder that serves as the placeholder for foo1 and set the reparse point on this file, then re-issue the application's request.
- the virtualization filter 204 will repeat the process to have placeholders for the components bar1 and 5.txt created. Note that in other embodiments, instead of the virtualization filter 204 automatically creating a placeholder for each component upon receiving from the virtualization provider 202 the information necessary to create the placeholder, the virtualization provider 202 may instead request the creation of a placeholder for each component by calling the CreatePlaceholders function of the user-mode library as it iterates through each component of the path.
- the virtualization filter 204 will clear the reparse processing flag before re-issuing the request.
- the file system 129 will then complete the request with STATUS_SUCCESS this time so that the request will complete and return to the application.
- placeholders may be created for subdirectories foo1 and bar1 and the file 5.txt.
- the directory foo ⁇ bar also contains subdirectories foo2 and foo3 (as illustrated in FIG. 10 ). Placeholders may not have been created for those subdirectories.
- the placeholders for the subdirectories foo, bar, foo1, bar1, and 5.txt may form a partial representation of the full directory hierarchy stored remotely on the network.
- an application may make changes to the local on-disk representation. For example, an application may create a new file 6.txt in the directory foo ⁇ bar ⁇ foo1 ⁇ bar1. Or the application could delete the file 5.txt from that directory or rename the file.
- the storage virtualization filter 204 and storage virtualization provider 202 may perform a synchronization operation to ensure that any partial representation of the directory hierarchy on disk remains synchronized with the corresponding portion of the full directory hierarchy on the remote storage.
- a goal of the storage virtualization techniques disclosed herein is to hide the details of the remote storage from applications such that the existence of directories and files appears to an application as if they were all stored and maintained locally, any changes to the on-disk representation by an application should take precedence. Accordingly, when changes are made by the file system in response to a request from an application, such as deleting or renaming a file, a mechanism is needed to inform the storage virtualization provider 202 during a merge operation that such a change has occurred to ensure that other applications will not be able to open or see this file in subsequent directory enumerations.
- the concept of a tombstone is introduced.
- a tombstone is information that remains on the secondary storage of the computer device (e.g., disk 124 ) after a file or directory represented by a placeholder is deleted or renamed by an application.
- a tombstone may be implemented by a new flag or attribute in the metadata of a placeholder for a file or directory that has been deleted. The flag indicates that the file or directory has been deleted or renamed, and the storage virtualization filter 204 and storage virtualization provider 202 may cooperate to ensure that the deletion or renaming represented by the tombstone is made to the full directory hierarchy on the remote storage when synchronizing the on-disk and remote storage representations.
- a regular file may contain metadata 302 about the file (e.g., attributes, time stamps, etc.), a primary data stream 304 that holds the data of the file, and optionally one or more secondary data streams 306 .
- a computing device storing the file may be configured to generate the metadata 302 for the file based on information contained in the primary data stream 304 of the file.
- FIG. 3 illustrates that the file is configured to generate the metadata 302 for the file based on information contained in the primary data stream 304 of the file.
- a placeholder 308 for a file may comprises: metadata 310 for the file, which may be identical to the metadata 302 of a regular file 300 ; a sparse primary data stream 312 which may contain none or some data of the file; information 314 which enables the remotely stored data for the file to be retrieved; and optionally one or more secondary data streams 316 .
- a computing device storing the placeholder for the file 308 may be unable to generate metadata 302 for the placeholder 308 of the file since the sparse primary data stream 312 may contain none or only a portion of the data needed to generate the metadata 302 about the file. The remainder of the data of the file needed to generate the metadata 302 may be stored remotely by a remote storage provider.
- an indexer may be configured to identify properties of files stored on the computing device 112 and to store those properties in a database on the computing device 112 , such as the secondary storage 124 .
- one type of property stored in the secondary storage may be properties that are part of the metadata of the file, such as a time stamp or a size of the file.
- a second type of property stored in the secondary storage may be properties that can be obtained by reading the contents of the file itself, such as an artist or track length in an example that the file is a music file. These properties may be stored in the secondary storage 124 and later retrieved by the indexer using a search function of the computing device 112 .
- the computing device 112 may be unable to generate the metadata 302 for the given file because the indexer does not have access to the contents of the file needed to generate the metadata. Thus, the computing device 112 may need to rely on the remote storage provider (e.g., storage virtualization provider 202 ) to generate the metadata 302 .
- the remote storage provider e.g., storage virtualization provider 202
- FIG. 11 illustrates an example method for receiving metadata associated with a file whose contents are stored remotely and storing that metadata in the secondary storage of a computing device.
- the method may be implemented in a computing device comprising a processor, memory, and secondary storage, such as computing device 112 .
- a placeholder for a file may be stored on the secondary storage of the computing device.
- the secondary storage may be, for example, the disk storage 124 illustrated in FIG. 1 .
- the files may comprise data at least some of which is stored on a network remotely from the secondary storage, such as the network (e.g., cloud) 208 .
- the placeholder may be generated by the storage virtualization filter 204 and may appear to a user or application as a regular file or directory on the computing device. However, the placeholder may not contain all or even any of the data of the file or directory.
- the storage virtualization provider 202 may store all or at least some of the data associated with the file in the remote network.
- Each of the placeholders may comprise a sparse data stream containing none or some data of the file and information which enables the remotely stored data of the file to be retrieved from the network.
- a request to store metadata associated with the file may be received.
- the request to store metadata associated with the file may be received, for example, by the storage virtualization filter 204 from the shell 210 .
- the request may be received directly from an application or other module running on the computing device, such as the storage virtualization provider 202 .
- the storage virtualization filter 204 may create and manage the placeholders for the files and directories, as well as metadata associated with the files and directories, and may notify the user-mode storage virtualization provider 202 of access attempts to the files or directories whose data is managed by the filter 204 and provider 202 .
- the metadata may be stored by the storage virtualization filter 204 in a secondary data stream of the placeholder for the given file.
- the metadata may be stored in the secondary data stream as a Binary Large Object (BLOB).
- BLOB Binary Large Object
- a BLOB may be a collection of binary data (e.g., images, audio or other multimedia objects) stored as a single entity.
- the secondary data stream of the placeholder for the given file may hold a plurality of BLOBs, each containing different metadata associated with the file. Each BLOB may store a particular type of metadata.
- FIG. 12 An example illustration of a secondary data stream of a placeholder in which one or BLOBs may be stored is shown in FIG. 12 .
- the secondary data stream may be named based, for example, on one or more characteristics of the secondary data stream.
- the secondary data stream may have properties similar to those of a primary data stream. For example, read and write operations of the secondary data stream may be performed using the same data stream APIs used for the primary data stream.
- the secondary data stream may comprise a header for storing information about the secondary data stream and the one or more BLOBs stored in the secondary data stream.
- a first portion of the header may comprise general information about the secondary data stream, such as the size of the data stream, the location of certain characteristics of the data stream, etc.
- the header of the secondary data stream may further comprise information about each of the one or more BLOBs stored in the secondary data stream.
- the secondary data stream may further comprise a property region for storage of the one or more BLOBs.
- the BLOBs may be offset from one another such that the content of the BLOBs does not overlap. There may also be empty space between BLOBs to allow for growth of one or more of the BLOBs.
- One or more of the BLOBs may also be compressed using a variety of compression algorithms in the secondary data stream in order to save space.
- the offset and compression properties of the one or more BLOBs in the secondary data stream may be stored in the header in the form of an index, each BLOB having its own entry in the index that specifies the offset of that BLOB (e.g., in bytes) within the secondary data stream and optionally also any other properties of the BLOB, such as any compression properties. Additionally or alternatively, the offset and compression information may be stored within the BLOB itself.
- the storage virtualization filter 204 illustrated in FIG. 4 may perform the storage of the one or more BLOBs. However, the storage virtualization filter 204 may not be aware of the properties contained within the BLOBs. In other words, the properties of the BLOBs may be opaque to the storage virtualization filter 204 . In one embodiment, the storage virtualization filter 204 may simply be aware that there is a BLOB of a certain size with opaque properties, and that some higher level entity (e.g., the shell 210 ) is acting to store this BLOB or to retrieve this BLOB from the secondary storage.
- some higher level entity e.g., the shell 210
- the shell 210 may be run in the user mode of the computing device 112 .
- the shell 210 may facilitate communication between an application 130 or the storage virtualization provider 202 and the storage virtualization filter 204 running in the kernel mode of the computing device 112 .
- the shell 210 may expose an API to at least one of the application 130 or the storage virtualization provider 202 to allow the application or storage virtualization provider to communicate with the storage virtualization filter 204 .
- the shell 210 may call a storage virtualization filter API to instruct the storage virtualization filter 204 to store the one or more BLOBs in the secondary storage, such as the disk storage 124 .
- the shell 210 may be capable of accessing the properties of the one or more BLOBs.
- FIG. 13 illustrates an example method 1300 implemented by the shell 210 for the storage virtualization of files.
- the shell may expose an application program interface (API) for use by at least one of an application or a storage virtualization provider for the storage of metadata in the secondary storage of the computing device.
- API application program interface
- the secondary storage may have stored thereon a placeholder for a file, the file comprising data at least some of which is stored on a network remotely from the secondary storage.
- the placeholder may comprise a sparse data stream containing none or some data of the file and information which enables the remotely stored data of the file to be retrieved from the network.
- the shell 210 may receive a request to set one or more properties of the file.
- the shell 210 may receive a request from at least one of an application 130 or the storage virtualization provider 202 to set properties that are part of the metadata of the file, such as a time stamp or a size of the file.
- the shell 210 may receive a request from at least one of an application 130 or the storage virtualization provider 202 to set properties that can be obtained by reading the contents of the file itself, such as an artist or track length in an example that the file is a music file.
- the request to set one or more properties of a file may be received in the form of a method call to an iProperty Store interface supported by the operating system.
- the shell 210 may combine the one or more properties into a Binary Large Object (BLOB) and, at step 1306 , the shell 210 may send, to a file system configured to manage the storage of files on the secondary storage, a request to store the BLOB in the placeholder for the given file.
- the request to store the BLOB in the placeholder for the given file may comprise a request to store the BLOB in a secondary data stream of the placeholder for the given file.
- a BLOB may be associated with a BLOB identifier so that the shell 210 may associate certain properties with the BLOB based on the BLOB identifier.
- the BLOB identifier may be assigned to the BLOB by one of the shell 210 or the storage virtualization filter 204 .
- the identifier may be a number, such as a 32 bit integer.
- the identifier may be a globally unique identifier (GUID). Some of those bits may be reserved for the placement of “flags” that may influence certain behaviors of the storage virtualization filter 204 . For example, a given flag may indicate that the BLOB may only be stored on a placeholder and never on a non-placeholder file. Thus, if that placeholder ever gets converted to a non-placeholder file (e.g., through hydration of the file), the storage virtualization filter 204 may delete the BLOB with the placeholder only flag.
- an application or the storage virtualization provider 202 may be configured to communicate with the shell 210 to set or retrieve property values of the one or more BLOBs.
- the request to store metadata associated with a given file may originate in the application or the storage virtualization provider 202 .
- the application or the storage virtualization provider 202 may be aware of the specific properties of the file.
- the application or the storage virtualization provider 202 may send a message to the shell 210 requesting that the shell set the properties on the file.
- this request may take the form of an IProperty API from the application or storage virtualization provider to the shell.
- the shell 210 may then form a BLOB that holds those property values and call a storage virtualization filter API to store the BLOB in the placeholder for the file (e.g., in a secondary data stream of the placeholder) on the secondary storage.
- an application 130 may want to query a property of a BLOB stored in the secondary storage.
- the application 130 may be a music application that wants to query the author of a given song file.
- the application 130 may communicate with the shell 210 to retrieve the requested properties from the BLOB.
- the shell 210 may retrieve the information from the storage virtualization filter 204 using an appropriate API call to the storage virtualization filter 204 .
- a number of operations may be performed on the one or more BLOBs stored within a placeholder for a file on the secondary storage, such as storing, retrieving, locking, and unlocking a BLOB. However, it is understood that the operations are not limited to these four operations.
- the shell 210 may call a store properties API or a retrieve properties API, respectively, of the storage virtualization filter 204 .
- the shell 210 may form a BLOB containing that property and then call the store properties API of the storage virtualization filter 204 in order to have the BLOB stored in the placeholder for the file.
- the shell may call the retrieve properties API of the storage virtualization filter 204 to have the BLOB containing that metadata retrieved from the placeholder for the file.
- the APIs may be used to store or retrieve two or more BLOBs at a time. Thus, the operations may operate on a set of BLOBs at once. If the secondary data stream has not been created by the first time a store or retrieve API is called, the storage virtualization filter 204 may be configured to automatically create the secondary data stream.
- the store properties API may be used to update an existing BLOB stored in an alternate data stream.
- the store properties API When the store properties API is called to store a BLOB having the same unique identifier as an existing BLOB, the entirety of the existing BLOB may be overwritten with the new BLOB, thus effectively updating it. However, the BLOB identifier may remain unchanged.
- the store properties API may also be used to delete an existing BLOB.
- the shell may call the store properties API with the identifier of the BLOB to be deleted and an indication that the BLOB has a length of 0.
- the storage virtualization filter 204 will delete the BLOB.
- a BLOB may be added, updated, or deleted from the secondary data stream of a placeholder.
- the retrieve properties API may not modify the secondary data stream at all.
- other applications, modules, or components may also be able to store, retrieve, update, and retrieve stored BLOBs also.
- the application may lock the BLOB using a lock properties API.
- a given application may lock multiple BLOBs using a single lock properties API call.
- there may be two types of locks available to an application an “exclusive lock” and a “shared lock.”
- An exclusive lock may give the application exclusive access to the BLOB until the application calls an unlock properties API.
- a shared lock may allow multiple applications to lock a given BLOB at the same time.
- application A may be able to request a shared lock on a BLOB even though the BLOB has already been locked by application B.
- a shared lock may allow any subsequent lockers to read the BLOB but may not allow the subsequent lockers to make edits.
- application A may be able to read the properties of the BLOB but may not be able to make changes to the BLOB.
- no applications may be able to make modifications to the BLOB while the BLOB is under a shared lock.
- two or more applications may agree on a set of rules regarding read and write operations to a BLOB under the shared lock. If an application attempts to acquire a lock on multiple BLOBs at once, and one of the BLOBs is already under an exclusive lock, the entire lock operation may fail for all of the BLOBs. Alternatively, the application may be granted a lock on only the BLOBs that are not under an exclusive lock.
- the storage virtualization filter 204 may be aware of the specific application that has locked a particular BLOB since the storage virtualization filter 204 is the component in charge of the store and retrieve operations.
- an application 130 may communicate with the shell 210 to request that individual property values be set on a file or be added or updated in a given BLOB.
- the application may identify the BLOB by the BLOB identifier, such as the 32 bit integer (e.g., GUID).
- the shell may then call a storage virtualization filter API, such as the store properties API, to store the BLOB in the secondary data stream.
- the storage virtualization filter 204 may then store the BLOB in the secondary data stream.
- the application may wish to retrieve an individual property of a given BLOB.
- the application may communicate with the shell to call a storage virtualization filter API, such as the retrieve properties API, causing the storage virtualization filter to find that BLOB in the secondary data stream and pass the contents of the BLOB to the shell.
- the shell may then retrieve the requested property and return it to the application.
- an application may want to modify a property value stored in an existing BLOB.
- the shell may determine that the particular value in the BLOB needs to be updated but that there are other properties in the BLOB that must be left alone. In order to address this, the shell may acquire an exclusive lock on the BLOB being changed.
- the shell may then call a retrieve properties API to read the properties of the BLOB into the shell's memory.
- the shell may then decode the BLOB so that it knows all of the individual values of the BLOB.
- the shell may change the property requested by the application to be modified, but may leave all other property values stored in the BLOB unchanged.
- the shell may then re-encode this set of values into a new BLOB and may call the store properties API to store the new BLOB in the secondary storage. However, the shell will use the same identifier for the new BLOB as the original BLOB.
- the storage virtualization filter 204 may then overwrite the old BLOB, and the shell 210 may call the unlock properties API to unlock the BLOB.
- the shell 210 may be configured to sort the one or more BLOBs based on the type of BLOB.
- the storage virtualization provider supplemental properties BLOB may comprise properties that are generated by or provided by a storage virtualization provider 204 —and for which the storage virtualization provider may make a request to the shell to store in associate with a file that the storage virtualization provider is managing on remote storage. These properties may be properties that describe the file in the context of the storage virtualization provider, such as whether the file is checked out, who last modified the file, and whether the file is shared between two or more users.
- the file format properties BLOB may contain information that is derivable from the contents of the file itself.
- the file format properties BLOB may store metadata about the artist, number of tracks, the length of each track, and the like.
- the file format properties BLOB may no longer be needed since the contents of the file may be present on the computing device.
- the file format properties BLOB may be deleted since it would make more sense to use the most up to date information.
- any storage virtualization provider supplemental properties BLOB may remain intact. It is understood that other types of BLOBs may be included as well.
- a third category of BLOB may allow an application to add metadata that describes a file. For example, if the application is a photograph application that can perform face recognition, the application may be able to store the names associated with the detected faces as metadata in the BLOB.
- the BLOB may be formatted in any number of ways.
- a properties store may identify certain properties of the BLOB using, for example, a globally unique identifier (GUI).
- GUI globally unique identifier
- unknown properties may also be stored.
- These properties may have a value that can be almost any serializable type (e.g., string, Boolean, signed/unsigned integers, etc.).
- the properties may be serialized into an internal format and then deserialized upon being read.
- the BLOB may also be compressed to save room in the secondary storage.
- Computer executable instructions i.e., program code
- a machine such as a computing device
- any of the steps, operations or functions described above may be implemented in the form of such computer executable instructions.
- Computer readable storage media include both volatile and nonvolatile, removable and non-removable media implemented in any non-transitory (i.e., tangible or physical) method or technology for storage of information, but such computer readable storage media do not include signals.
- Computer readable storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other tangible or physical medium which may be used to store the desired information and which may be accessed by a computer.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Human Computer Interaction (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
- This application is a continuation application of U.S. patent application Ser. No. 15/848,519, filed on Dec. 20, 2017, now U.S. Pat. No. 11,507,534, which claims the benefit of U.S. Provisional Patent Application No. 62/504,767 filed on May 11, 2017, titled “Metadata Storage For Placeholders In A Storage Virtualization System,” the content of all is hereby incorporated by reference in their entirety.
- With the ever increasing need for data storage in computer systems, the use of cloud storage providers is increasing. With cloud storage, the data of a file or directory is stored “in the cloud” rather than on a user's local computing device. When the data for a file or directory is needed, it can be pulled “from the cloud” back onto the user's local computing device. In a typical computer system, a component located on a computing device, such as an indexer, may be configured to index properties associated with the files and to store these properties as metadata with the file. Unfortunately, the process of creating and storing metadata for files stored in the cloud is not as seamless as when those files are stored locally on the computing device.
- Disclosed herein are techniques that allow metadata for a file to be received from a storage virtualization provider, or any other application, module, or component desiring to store metadata for a file hosted by a storage virtualization provider, and to have that metadata be stored within a placeholder for the file on the secondary storage of the local computing device. For example, in a storage virtualization system, the data of a file may be stored remotely, such as on a network (i.e., in the cloud), and access to the data of the file by applications, modules, or components of a local computing device may be handled by a storage virtualization provider executing on the local computing device that is configured to retrieve the remotely stored data of the file as needed. In such a system, a storage virtualization filter of the file system of the computing device may store a placeholder for the file on secondary storage of the computing device. The placeholder for the file may comprise a sparse data stream containing none or some of the data of the file and information which enables the remotely stored data of the file to be retrieved from the network, as needed. Although the placeholder may not actually hold any of the data of the file, the placeholder may appear to applications running on the computing device as if the complete file was stored on the secondary storage. But because some or all of the data for the file is stored remotely and is not present on the local computing device, certain applications or components on the local computing device that might otherwise generate metadata for the file—such as an indexer—cannot do so because not all of the data of the file resides on the local computing device. In the case of certain metadata, for example, the file system may need to rely on the storage virtualization provider to generate metadata associated with the file, since the storage virtualization provider manages the full file (i.e., all of its data) on remote storage. Disclosed herein are methods and apparatus that enable applications or other entities on a local computing device, such as a storage virtualization provider, to request that metadata for a remotely stored file be stored in association with the file on the local computing device. According to the methods and apparatus disclosed herein, in one embodiment, when such a request is received, a storage virtualization filter of the file system on the local computing device stores the metadata within the placeholder for the file on the secondary storage of the computing device. In one embodiment, the file system may store the metadata as a Binary Large Object (BLOB) in a secondary data stream of the placeholder for the file.
- The foregoing Summary, as well as the following Detailed Description, is better understood when read in conjunction with the appended drawings. In order to illustrate the present disclosure, various aspects of the disclosure are shown. However, the disclosure is not limited to the specific aspects discussed. In the drawings:
-
FIG. 1 illustrates an exemplary computing device, in which the aspects disclosed herein may be employed; -
FIG. 2 illustrates an example architecture for storage virtualization in accordance with one embodiment; -
FIG. 3A illustrates a regular file, in accordance with one embodiment; -
FIG. 3B illustrates a placeholder for a file, in accordance with one embodiment; -
FIG. 3C illustrates a reparse point for a placeholder for a file; -
FIG. 4 illustrates further details of an architecture for storage virtualization in accordance with one embodiment; -
FIG. 5 illustrates a process of creating a placeholder for a file, in accordance with one embodiment; -
FIG. 6 illustrates a process of accessing file data for a placeholder, in accordance with one embodiment; -
FIG. 7A illustrates example details of the file data access process ofFIG. 6 ; -
FIG. 7B illustrates additional example details of the file data access process ofFIG. 6 ; -
FIG. 8A illustrates a regular directory, in accordance with one embodiment; -
FIG. 8B illustrates a placeholder for a directory, in accordance with one embodiment; -
FIG. 8C illustrates a reparse point for a directory placeholder, in accordance with one embodiment; -
FIG. 9 illustrates a process for enumeration of a placeholder directory, in accordance with one embodiment; -
FIG. 10 is a diagram of an example directory hierarchy; -
FIG. 11 illustrates a process for storing metadata in a secondary data stream of a placeholder for a file; -
FIG. 12 shows an example secondary data stream; and -
FIG. 13 illustrates a process for creating and storing a Binary Large Object (BLOB). - Disclosed herein are techniques that allow metadata for a file to be received from a storage virtualization provider, or any other application, module, or component desiring to store metadata for a file hosted by a storage virtualization provider, and to have that metadata be stored within a placeholder for the file on the secondary storage of the local computing device. For example, a file system executing on a computing device may receive, from a storage virtualization provider or from another application, module, or component, a request to store metadata associated with the file. And in response to this request, the file system may store the metadata as a Binary Large Object (BLOB) in a secondary data stream of the placeholder for the file.
-
FIG. 1 illustrates anexample computing device 112 in which the techniques and solutions disclosed herein may be implemented or embodied. Thecomputing device 112 may be any one of a variety of different types of computing devices, including, but not limited to, a computer, personal computer, server, portable computer, mobile computer, wearable computer, laptop, tablet, personal digital assistant, smartphone, digital camera, or any other machine that performs computations automatically. - The
computing device 112 includes aprocessing unit 114, asystem memory 116, and a system bus 118. The system bus 118 couples system components including, but not limited to, thesystem memory 116 to theprocessing unit 114. Theprocessing unit 114 may be any of various available processors. Dual microprocessors and other multiprocessor architectures also may be employed as theprocessing unit 114. - The system bus 118 may be any of several types of bus structure(s) including a memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, Industry Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Card Bus, Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), Firewire (IEEE 1394), and Small Computer Systems Interface (SCSI).
- The
system memory 116 includesvolatile memory 120 andnonvolatile memory 122. The basic input/output system (BIOS), containing the basic routines to transfer information between elements within thecomputing device 112, such as during start-up, is stored innonvolatile memory 122. By way of illustration, and not limitation,nonvolatile memory 122 may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory.Volatile memory 120 includes random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM). -
Computing device 112 also may include removable/non-removable, volatile/non-volatile computer-readable storage media, which may be referred to herein as secondary storage.FIG. 1 illustrates secondary storage, for example, in the form of adisk storage 124. Secondary storage (e.g., disk storage) 124 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS-100 drive, memory card (such as an SD memory card), or memory stick. In addition,disk storage 124 may include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM). To facilitate connection of thedisk storage devices 124 to the system bus 118, a removable or non-removable interface is typically used such asinterface 126. The terms disk storage and secondary storage may be used interchangeably herein. -
FIG. 1 further depicts software that acts as an intermediary between users and the basic computer resources described in thecomputing device 112. Such software includes anoperating system 128.Operating system 128, which may be stored ondisk storage 124, acts to control and allocate resources of thecomputing device 112.Applications 130 take advantage of the management of resources byoperating system 128 throughprogram modules 132 andprogram data 134 stored either insystem memory 116 or ondisk storage 124. It is to be appreciated that the aspects described herein may be implemented with various operating systems or combinations of operating systems. As further shown, theoperating system 128 includes afile system 129 for storing and organizing, on thedisk storage 124, computer files and the data they contain to make it easy to find and access them. - A user may enter commands or information into the
computing device 112 through input device(s) 136.Input devices 136 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to theprocessing unit 114 through the system bus 118 via interface port(s) 138. Interface port(s) 138 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB). Output device(s) 140 use some of the same type of ports as input device(s) 136. Thus, for example, a USB port may be used to provide input tocomputing device 112, and to output information fromcomputing device 112 to anoutput device 140.Output adapter 142 is provided to illustrate that there are someoutput devices 140 like monitors, speakers, and printers, amongother output devices 140, which require special adapters. Theoutput adapters 142 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between theoutput device 140 and the system bus 118. It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 144. -
Computing device 112 may operate in a networked environment using logical connections to one or more remote computing devices, such as remote computing device(s) 144. The remote computing device(s) 144 may be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device, another computing device identical to thecomputing device 112, or the like, and typically includes many or all of the elements described relative tocomputing device 112. For purposes of brevity, only amemory storage device 146 is illustrated with remote computing device(s) 144. Remote computing device(s) 144 is logically connected tocomputing device 112 through anetwork interface 148 and then physically connected viacommunication connection 150.Network interface 148 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN). LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet, Token Ring and the like. WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL). - Communication connection(s) 150 refers to the hardware/software employed to connect the
network interface 148 to the bus 118. Whilecommunication connection 150 is shown for illustrative clarity insidecomputing device 112, it may also be external tocomputing device 112. The hardware/software necessary for connection to thenetwork interface 148 includes, for exemplary purposes only, internal and external technologies such as modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards. - As used herein, the terms “component,” “system,” “module,” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a server and the server may be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
- In accordance with the storage virtualization techniques disclosed herein, a placeholder may be created on a local computing device for a file or directory. The placeholder appears to a user or application as a regular file or directory on the computing device. That is, an application can issue I/O calls on the file or directory as if the file or directory was stored locally, but the placeholder may not contain all the data of the file or directory.
FIG. 2 is a block diagram illustrating the components of an architecture for implementing the storage virtualization techniques described herein, in accordance with one embodiment. As shown, in one embodiment, the architecture comprises: a user-mode storagevirtualization provider module 202 responsible for retrieving remotely stored file and directory data from a network 208 (e.g., “from the cloud”); afile system filter 204, referred to herein as a storage virtualization filter, that creates and manages placeholders for files and directories and notifies the user-mode storage virtualization provider of access attempts to files or directories whose data is managed by thefilter 204 andprovider 202; a user-mode library 206 that abstracts many of the details of provider-filter communication; and ashell component 210 that serves as an interface for access to thefile system 129 by anapplication 130 and thestorage virtualization provider 202. Note that while thestorage virtualization provider 202 runs in user-mode in the illustrated embodiment ofFIG. 2 , in other embodiments thestorage virtualization provider 202 could be a kernel-mode component. The disclosed architecture is not limited to the user-mode embodiment described herein. - In the illustrated embodiment, the user-mode storage
virtualization provider module 202 may be implemented (e.g., programmed) by a developer of a remote storage service or entity that provides remote storage services to computing device users. Examples of such remote storage services, sometimes also referred to as cloud storage services, include Microsoft OneDrive and similar services. Thus, there may be multiple different storage virtualization providers, each for a different remote storage service. In the illustrated embodiment, the storagevirtualization provider module 202 interfaces with thestorage virtualization filter 204 via application programming interfaces (APIs) defined and implemented by theuser mode library 206. The storagevirtualization provider module 202 implements the intelligence and functionality necessary to store and fetch file or directory data to/from a remote storage location (not shown) on thenetwork 208. - The user-
mode library 206 abstracts many of the details of communication between thestorage virtualization filter 204 and thestorage virtualization provider 202. This may make implementing astorage virtualization provider 202 easier by providing APIs that are simpler and more unified in appearance than calling various file system APIs directly. The APIs are intended to be redistributable and fully documented for third party's to develop storage virtualization providers for their remote storage services. Also, by implementing such alibrary 206, underlying provider-filter communication interfaces may be changed without breaking application compatibility. - As explained above, the storage virtualization techniques described herein may be applied to both files and directories in a computing device. For ease of illustration only, the operation of these storage virtualization techniques on files will be explained first, followed by an explanation of the operation of these techniques on directories.
- In one embodiment, a file may begin either as a regular file or as a placeholder.
FIG. 3A illustrates an example of aregular file 300. As shown, a regular file typically containsmetadata 302 about the file (e.g., attributes, time stamps, etc.), aprimary data stream 304 that holds the data of the file, and optionally one or more secondary data streams 306. In contrast, as illustrated inFIG. 3B , in one embodiment, aplaceholder 308 comprises:metadata 310 for a file, which may be identical to themetadata 302 of aregular file 300; a sparseprimary data stream 312 which may contain none or some data of the file (the rest of the data being stored remotely by a remote storage provider);information 314 which enables the remotely stored data for the file to be retrieved; and optionally one or more secondary data streams 316. Because all or some of the data for a file represented by aplaceholder 308 is not stored as a primary data stream in the file, theplaceholder 308 may consume less space in the local storage of a computing device. Note that a placeholder can at times contain all of the data of the file (for example because all of it was fetched), but as a placeholder, it is still managed by thestorage virtualization filter 204 andstorage virtualization provider 202 as described herein. - With reference to
FIG. 3C , in one embodiment, theinformation 314 which enables the remotely stored data for the file to be retrieved comprises areparse point 314. As shown, a reparse point is a data structure comprising atag 322 andaccompanying data 324. Thetag 322 is used to associate the reparse point with a particular file system filter in the file system stack of the computing device. In the present embodiment, the tag identifies the reparse point as being associated with thestorage virtualization filter 204. In one embodiment, thedata 324 of thereparse point 314 may comprise a globally unique identifier (GUID) associated with thestorage virtualization provider 202—to identify thestorage virtualization provider 202 as the provider for the actual file data for the placeholder. In addition, thedata 324 may comprise an identifier of the file itself, such as a file name or other file identifier. - In one embodiment, placeholders do not contain any of the file data. Rather, when there is a request to access the data of a file represented by the placeholder, the
storage virtualization filter 204 must work with thestorage virtualization provider 202 to fetch all of the file data, effectively restoring the full contents of the file on thelocal storage medium 124. However, in other embodiments, partial fetches of data are enabled. In these embodiments, some extents of the primary data stream of a file may be stored locally as part of the placeholder, while other extents are stored and managed remotely by thestorage virtualization provider 202. In such embodiments, thedata 324 of the reparse point of a placeholder may contain a data structure, such as an “on-disk” bitmap, that identifies extents (i.e. chunks) of the file that are stored locally versus those that are stored remotely. In one embodiment, such an on-disk bitmap may comprise a sequence of bits, where each bit represents one 4 KB chunk of the file. In other embodiments, each bit may represent a different size chunk of data. In one embodiment, a bit is set if the corresponding chunk is already present in the local storage. As described hereinafter, when a request to read an extent of a file represented by a placeholder is received, thestorage virtualization filter 204 examines the on-disk bitmap to determine what parts of the file, if any, are not present on the local storage. For each range of a file that is not present, thestorage virtualization filter 204 will then request thevirtualization provider 202 to fetch those ranges from the remote storage. -
FIG. 4 is a block diagram of the storage virtualization architecture ofFIG. 2 , as embodied in a computing device that implements the Microsoft Windows operating system and in which thefile system 129 comprises the Microsoft NTFS file system. It is understood that the architecture illustrated inFIG. 4 is just one example, and the aspects of the storage virtualization solution described herein are in no way limited to implementation in this example environment. Rather, the aspects disclosed herein may be implemented in any suitable operating system and file system environment. - As shown in
FIG. 4 , anapplication 130 may perform file operations (e.g., create, open, read, write) by invoking an appropriate I/O call via theWin32 API 402 of the Windows operating system. These I/O calls will then be passed to an I/O Manager 404 in the kernel space of the operating system. The I/O Manager will pass the I/O call to the file system's stack, which may comprise one or more file system filters. Initially, the call will pass through these filters to thefile system 129 itself. In the case of Microsoft's NTFS reparse point technology, if the file system accesses a file ondisk 124 that contains a reparse point data structure, the file system will pass the I/O request back up to thestack 406. A file system filter that corresponds to the tag (i.e., globally unique identifier) of the reparse point will recognize the I/O as relating to a file whose access is to be handled by that filter. The filter will process the I/O and then pass the I/O back to the file system for proper handling as facilitated by the filter. - In the case of placeholder files described herein, the file system will pass the I/O request back up the stack to the
storage virtualization filter 204, which will handle the I/O request in accordance with the methods described hereinafter. - With continued reference to
FIG. 4 ,FIG. 5 is a flow diagram illustrating the steps performed by thestorage virtualization filter 204 in order to create a placeholder for a file, in accordance with the example architecture illustrated inFIG. 4 . The process may be initiated by thestorage virtualization provider 202, which may call a CreatePlaceholders function of the user-mode library 206 to do so. Thelibrary 206 will, in turn, convert that call into a corresponding CreatePlaceholders message to thestorage virtualization filter 204, which will receive that message in step 502 ofFIG. 5 . Next, in response to the CreatePlaceholders message, thestorage virtualization filter 204 will create a 0-length file that serves as the placeholder, as shown atstep 504. The CreatePlaceholders message will contain a file name for the placeholder, given by thestorage virtualization provider 202. Instep 506, thestorage virtualization filter 204 will mark the 0-length file as a sparse file. In one embodiment, this may be done by setting an attribute of the metadata of the placeholder. A file that is marked as a sparse file will be recognized by the underlying file system as containing a sparse data set—typically all zeros. The file system will respond by not allocating hard disk drive space to the file (except in regions where it might contain nonzero data). - Continuing with the process illustrated in
FIG. 5 , instep 508, thestorage virtualization filter 204 will set the primary data stream length of the file to a value given by thestorage virtualization provider 202 in the CreatePlaceholders message. Instep 510, thestorage virtualization filter 204 sets any additional metadata for the placeholder file, such as time stamps, access control lists (ACLs), and any other metadata supplied by thestorage virtualization provider 202 in the CreatePlaceholders message. Lastly, instep 512, thestorage virtualization filter 204 sets the reparse point and stores it in the placeholder file. As described above in connection withFIG. 3C , the reparse point comprises a tag associating it with thestorage virtualization filter 204 and data, which may include an identifier of thestorage virtualization provider 202 that requested the placeholder, the file name or other file identifier given by thestorage virtualization provider 202, and an on-disk bitmap or other data structure that identifies whether the placeholder contains any extents of the file data. - Once creation of the placeholder is completed, the placeholder will appear to a user or application (e.g., application(s) 130) as any other file stored locally on the computing device. That is, the details of the remote storage of the file data is effectively hidden from the applications(s).
- In order for an application to issue I/O requests on a file, the application typically must first request the file system to open the file. In the present embodiment, an application will issue a CreateFile call with the OPEN_EXISTING flag set via the Win32 API. This request to open the file will flow down through the
file system stack 406 to thefile system 129. As described above, in the case of a placeholder file, thefile system 129 will detect the presence of the reparse point in the file and will send the request back up thestack 406 where it will be intercepted by thestorage virtualization filter 204. Thestorage virtualization filter 204 will perform operations necessary to open the file and will then reissue the request to thefile system 129 in a manner that allows the file system to complete the file open operation. The file system will then return a handle for the opened file to the requesting application. At this point, theapplication 130 may then issue I/O calls (e.g., read, write, etc.) on the file. -
FIG. 6 is a flow diagram illustrating a method for processing an I/O request to read all or a portion of a file represented by a placeholder, in accordance with one embodiment. A request to read a file represented by a placeholder may come from anapplication 130 via theWin32 API 402 in the form of a ReadFile call. As shown, instep 602, the ReadFile call will be received by thestorage virtualization filter 204. Atstep 604, thestorage virtualization filter 204 will determine whether the requested range of data for the file is present in the placeholder or whether it is stored remotely by thestorage virtualization provider 202. This determination may be made by examining the on-disk bitmap stored as part of the data of the reparse point for the placeholder. If thestorage virtualization filter 204 determines that the requested range of data is stored locally (for example, because it was fetched from remote storage in connection with a prior I/O request), then instep 606 thestorage virtualization filter 204 will pass the ReadFile call to thefile system 129 for normal processing. The file system will then return the data to the requesting application. - If all or some of the data is not present in the local storage, then in
step 608 thestorage virtualization filter 204 must formulate one or more GetFileData requests to thestorage virtualization provider 202 to fetch the required data. Reads typically result in partial fetches, while some data-modifying operations may trigger fetching of the full file. Once the desired fetch range is determined, thestorage virtualization filter 204 must decide whether to generate a GetFileData request for all, some, or none of the range. Preferably, the filter tries to generate a GetFileData for a particular range only once. So, if an earlier GetFileData request is outstanding, and another operation arrives whose requested range overlaps the outstanding GetFileData request, thefilter 204 will trim the range needed by the second operation so that its GetFileData request to theprovider 202 does not overlap the previous request. This trimming may result in no GetFileData request at all.FIG. 7A illustrates this functionality. - As shown in
FIG. 7A , a second ReadFile request (“ReadFile 2”) overlaps a prior request (“ReadFile 1”). So, thestorage virtualization filter 204 trims the request range of the GetFileData request that it generates to thestorage virtualization provider 202. A third ReadFile request (“ReadFile 3”) is fully encompassed by the two prior requests, so there is no need for thefilter 204 to fetch data to satisfy that request. All the data requested byReadFile 3 will have already been fetched in response to the previous two requests. Thus, as illustrated, thestorage virtualization filter 204 determines whether any portion of the remotely stored data it needs to retrieve (i.e., the data for which it has determined one or more GetFileData requests is needed) has previously been requested from thestorage virtualization provider 202 but not yet received, and then if so, it trims any new requests to the storage virtualization provider so that they do not overlap with any such previously requested but not yet received data. - As illustrated in
FIG. 7B , thestorage virtualization filter 204 may determine which ranges of file data need to be requested from thestorage virtualization provider 202 by examining the on-disk bitmap that, in one embodiment, is maintained as part of the data of the reparse point of the placeholder. The bitmap is depicted as the middle rectangle in the diagram. Ranges of the file that are already stored on disk are indicated by the hatched spaces in the bitmap. As mentioned above, each bit of the bitmap may indicate the status of a corresponding range (e.g., each bit may represent a corresponding 4 KB range) of the file represented by the placeholder. As illustrated inFIG. 7B , after examining the bitmap, thestorage virtualization filter 204 is able to determine which data can be read from disk and which data is needed from thestorage virtualization provider 202. The bottom rectangle illustrates the result of comparing the ReadFile request with the on-disk bitmap. The regions the filter will read from disk are indicated, as are the regions the filter will need to obtain from theprovider 202. - In one embodiment, the
storage virtualization filter 204 may also maintain a tree of in-flight GetFileData requests for each file. Each entry in the tree records the offset and length of data the filter has requested from the provider and not yet received. The tree may be indexed by the file offset. For each region thefilter 204 determines is not yet present, thefilter 204 may consult the in-flight tree to determine whether any of the regions it may need have already been requested. This may result in further splitting of the GetFileData requests. Once the filter has determined the final set of GetFileData requests it needs to send, it may insert the GetFileData requests into the in-flight tree and sends them to theprovider 202. - Referring again to
FIG. 6 , thestorage virtualization filter 204 will issue any necessary GetFileData requests to thestorage virtualization provider 202 instep 608. Upon receipt, the user-mode library incorporated in thestorage virtualization provider 202 will invoke a corresponding GetFileData callback function implemented by thestorage virtualization provider 202. Thestorage virtualization provider 202 will then perform operations necessary to retrieve the requested data from remote storage on the network. Thestorage virtualization provider 202 will then return the data to thelibrary 206, and instep 610, the requested file data is returned to thestorage virtualization filter 204. At this point, there are two alternatives. - In one alternative, the storage virtualization filter issues a WriteFile request to the
file system 129 requesting that the fetched data be written to the data stream of the placeholder. Then, instep 614, thestorage virtualization filter 204 will update the on-disk bitmap to indicate that the particular range(s) of data now resides on disk. Note that in one embodiment, thestorage virtualization filter 204 makes a distinction between unmodified resident data and modified resident data, and this distinction can potentially help with differential syncing of resident and remote data. - Alternatively, in accordance with another feature of the storage virtualization solution described herein, instead of writing the fetched data to disk, the
storage virtualization filter 204 may return the requested data to theapplication 130 directly, without storing the data on disk. This may be advantageous in situations where disk space is already limited. This feature may also be used to implement a form of data streaming from the remote storage to the requesting application. - According to another aspect of the storage virtualization techniques described herein, the
storage virtualization filter 204 may also initiate and manage the conversion of a regular file to a placeholder. During this process, a placeholder will be created for the file as described above, and the data of the primary data stream of the regular file will be sent to thestorage virtualization provider 202 for remote storage on the network. For ease of description only, the method of converting a regular file to a placeholder and moving its primary data stream data to remote storage may be referred to as “dehydration,” and the method of fetching the remotely stored data of a placeholder from remote storage and writing it back to disk may be referred to as “hydration.” - Storage Virtualization for Directories
- The storage virtualization techniques described herein may also be applied to directories in a manner similar to how files are treated. In many file systems, directories are implemented as files themselves. As illustrated in
FIG. 8A , a directory typically comprisesmetadata 802 which provides various information about the directory, such as the name of the directory, its length, time of creation, and other information useful to the file system or an application. In addition to themetadata 802, the directory will also contain one or morechild directory entries 804. Each child entry may represent a file within the directory or a subdirectory of the directory. For example, a child entry for a file may contain a field that stores attributes associated with the file (such as whether the file is “read only” or “hidden”), a field that stores characters of a file name for the file, one or more fields storing information indicating the date and time of file creation, a field indicating a size of the file, and a field indicating a starting location (e.g., starting cluster) on the storage medium where the data for the file resides. Of course, this is just one example of the format and contents of a child entry, and it is understood that the formats and contents of child entries may differ from file system to file system. A child entry for a subdirectory may comprise similar fields for the file representing the subdirectory. Often a directory is part of a larger hierarchy of directories. The top most directory of such a hierarchy is often referred to as the root directory. - In accordance with the storage virtualization techniques disclosed herein, a placeholder may be created for a directory.
FIG. 8B illustrate an example placeholder for a directory. As shown, the placeholder may comprise a file containing:metadata 808, which may include some or all of themetadata 802 of a full directory; none, some, or allchild entries 810 of the directory; andinformation 812 which enables any remotely stored child entries for the directory to be retrieved. Because all or some of the child entries for a directory represented byplaceholder directory 806 may not be stored in the directory on secondary storage (e.g., disk 124), theplaceholder directory 806 may consume less space in the local storage of a computing device. - With reference to
FIG. 8C , in one embodiment, theinformation 812 which enables the remotely stored child entries for the directory to be retrieved comprises areparse point 814. As shown, thereparse point 814 is a data structure comprising atag 816 andaccompanying data 818. As described above, the tag is used to associate the reparse point with a particular file system filter in the file system stack of the computing device. In the present embodiment, the tag identifies the reparse point as being associated with thestorage virtualization filter 204. In one embodiment, thedata 818 of thereparse point 814 may comprise a globally unique identifier associated with thestorage virtualization provider 202—to identify thestorage virtualization provider 202 as the provider for the actual child entries for the placeholder directory. In addition, thedata 818 may comprise an identifier of the directory itself, such as a directory name or other directory identifier. - As in the case of placeholders for files, a
storage virtualization provider 202 that is maintaining a full directory hierarchy on remote storage over a network may request that a placeholder be created for a directory. In the case of directories, however, thestorage virtualization provider 202 may initially request creation of a placeholder only for the root directory in a remotely stored directory hierarchy. Then, when an application begins to enumerate that directory, thestorage virtualization provider 202 may request the creation of additional placeholders for the child directories (i.e., subdirectories) and/or the files under the root directory. As used herein, the phrase “enumerate a directory” and the like refers to a process by which the contents of a directory, including any files or subdirectories (each of which is represented in the directory by one or more respective child entries), may be examined or retrieved (such as in the form a directory listing) upon request to the file system of a computing device. - As with the creation of placeholders for files, the
storage virtualization provider 202 can request the creation of a placeholder for a directory, for example, by calling a CreatePlaceholders function of the user-mode library 206. In that example implementation, thelibrary 206 will, in turn, convert that call into a corresponding CreatePlaceholders message to the storage virtualization filter 502. In response to the CreatePlaceholders message, thestorage virtualization filter 204 will create an empty directory (i.e., an empty file) that serves as the placeholder for the directory. Thestorage virtualization filter 204 may then store in the placeholder directory any additional metadata associated with the directory, such as time stamps, access control lists (ACLs), and other metadata supplied by thestorage virtualization provider 202 in the CreatePlaceholders message. Thestorage virtualization filter 204 will then add to the placeholder information which enables any remotely stored child entries of the directory to be retrieved from remote storage. In the embodiment illustrated inFIG. 8C , this information may comprise a reparse point. As described above in connection withFIG. 8C , the reparse point comprises a tag associating it with thestorage virtualization filter 204 and data, which may include an identifier of thestorage virtualization provider 202 that requested the placeholder and the directory name or other directory identifier given by thestorage virtualization provider 202. - Once creation of the placeholder for the directory is completed, the placeholder will appear to a user or application (e.g., application(s) 130) as a directory stored locally on the computing device. That is, the details of the remote storage of the directory is effectively hidden from the applications(s).
- The process for enumeration of a directory represented by a placeholder is similar to the process illustrated in
FIG. 6 for accessing data of a placeholder for a file.FIG. 9 illustrates the steps performed by thestorage virtualization filter 204 for directory enumeration, in accordance with one embodiment. An application will typically initiate directory enumeration via, for example, a Win32 API call requiring the directory to be enumerated, such as a request to list the contents of the directory or a request to access a file having the directory in its directory path. As in the case of files, this I/O call or request will be passed to thefile system 129, which, in the embodiment illustrated herein, will detect the reparse point in the directory placeholder and pass the I/O call back up the file system stack to thestorage virtualization filter 204 for processing. - As shown in
FIG. 9 , in one embodiment, thestorage virtualization filter 204 will begin the process atstep 902 by issuing a StartDirectoryEnumeration command to thestorage virtualization provider 202. Upon receiving this command, thestorage virtualization provider 202 will establish a context that can be used throughout a set of enumeration requests for the directory. The StartDirectoryEnumeration command will include the pathname from the root of the remotely stored directory hierarchy to the directory to be enumerated. Instep 906, the storage virtualization filter will issue a GetDirectoryEntries command to thestorage virtualization provider 202 to request that thestorage virtualization provider 202 fetch (i.e., retrieve) all or some range (e.g., 1 to N) of child directory entries of the directory from the remote storage. In one embodiment, the first GetDirectoryEntries command may include a search string, and thestorage virtualization provider 202 may only fetch the directory entries that match this search string. The search string could be a full file name, e.g. foo.txt or a wild card name, e.g. foo*. In response to the GetDirectoryEntries command, thelibrary 206 will invoke a corresponding callback function implemented by thestorage virtualization provider 202, which will cause thestorage virtualization provider 202 to fetch the requested entries from the remote storage and return them to thestorage virtualization filter 204. Instep 908, thestorage virtualization filter 204 receives the fetched directory entries from thestorage virtualization provider 202. The received entries may then be returned to the requesting application or other entity that may have triggered the enumeration. - In one embodiment, as illustrated in
optional step 910, the child entries received instep 908 may be written to the placeholder for the directory on the secondary storage (e.g., storage 124) of the computing device. This may result in a partial representation of the directory on the secondary storage. On subsequent enumerations, this may result in faster processing, as the child entries needed to satisfy a subsequent enumeration may actually be stored locally on the secondary storage within the placeholder of the enumerated directory. Also, when at least some of the child entries of a directory are stored locally on the secondary storage, thestorage virtualization filter 204 may respond to a subsequent enumeration request for the directory by enumerating both the locally stored child entries and the remotely stored child entries and then merging the results before returning the enumerated entries to the requesting application. In one embodiment, in the event of any conflicting entries during that merging process, the locally stored child entries may take precedence over the child entries retrieved from remote storage. That is, if there are versions of the same child entry in both the local storage (e.g., within the directory placeholder on the secondary storage) and in the remotely stored representation of the directory, the locally stored version will be returned to the requesting application instead of the version retrieved from remote storage. Alternatively, in other embodiments, a policy may be established by which the child entries retrieved from remote storage take precedence over any locally stored child entries. - Once the enumeration is completed, in one embodiment, the
storage virtualization filter 204 may end the enumeration process by issuing a EndDirectoryEnumeration command to thestorage virtualization provider 202, and upon receiving this command, thestorage virtualization provider 202 will free any resource(s), e.g. memory or opened handles, used during the process. - The process of writing fetched child entries to local storage is different for directories than it is for files. As mentioned above, the
storage virtualization provider 202 may initially request creation of a placeholder directory only for the root directory in a remotely stored directory hierarchy. Then, when an application begins to enumerate that directory, thestorage virtualization provider 202 may request the creation of additional placeholders for the child subdirectories and/or the files under the root. Alternatively, thestorage virtualization filter 204 may decide whether to create additional placeholders for the child subdirectories and/or the files under the root. For example, the remotely stored directory hierarchy maintained by thestorage virtualization provider 202 on remote storage may have the hierarchy illustrated inFIG. 10 . As shown, the example hierarchy has a root directory called “foo,” which contains files “1.txt,” “2.txt,” “3.txt” and a subdirectory called “bar.” When the application requests to enumerate the root directory foo, the process described above will return the child entries for the files 1.txt, 2.txt, and 3.txt and the child entry for the subdirectory bar. But at that point, the only item stored on the secondary storage of the computing device is the directory foo. Accordingly, in conjunction with this directory enumeration, thestorage virtualization provider 202 may also then request thestorage virtualization filter 204 to create placeholders for each of the files 1.txt, 2.txt, and 3.txt and for the subdirectory bar. - Continuing this example, at this point the on-disk representation of the directory hierarchy will include the directory foo, and the placeholders for 1.txt, 2.txt, and 3.txt and the subdirectory bar. Suppose that the remotely stored virtualized directory hierarchy further includes a file with the path foo\bar\foo1\bar1\5.txt and that an application requests that file. The
storage virtualization filter 204 will need to fetch and create placeholders for each of the additional subdirectories foo1 and bar1 as well as the file 5.txt. In accordance with the storage virtualization techniques disclosed herein, thestorage virtualization filter 204 can request this all at once or it can be requested in an iterative process. - More specifically, in one embodiment, the
storage virtualization filter 204 may attach a reparse processing flag to the request so that when the application's request for that file reaches the file system, if the last component of the partial on-disk directory hierarchy representation (“bar” in the example) contains the reparse point tag of thestorage virtualization filter 204, the file system will complete the request with STATUS_REPARSE. - In the virtualization filter's handler to this status code, it issues a GetPlaceholderInformation command to the
storage virtualization provider 202 with the name of the next component relative to the virtualization root, e.g., bar\foo1 in the present example. Upon receiving this command, thestorage virtualization provider 202 checks if the requested path exists in the remote storage, and if yes, thevirtualization provider 202 returns to thestorage virtualization filter 204 the information necessary to create a placeholder for foo1. Thestorage virtualization filter 204 will then create a file named foo1 under the foo\bar\ folder that serves as the placeholder for foo1 and set the reparse point on this file, then re-issue the application's request. Thevirtualization filter 204 will repeat the process to have placeholders for the components bar1 and 5.txt created. Note that in other embodiments, instead of thevirtualization filter 204 automatically creating a placeholder for each component upon receiving from thevirtualization provider 202 the information necessary to create the placeholder, thevirtualization provider 202 may instead request the creation of a placeholder for each component by calling the CreatePlaceholders function of the user-mode library as it iterates through each component of the path. - After 5.txt is created on the secondary storage, since 5.txt is the last component in the request, the
virtualization filter 204 will clear the reparse processing flag before re-issuing the request. Thefile system 129 will then complete the request with STATUS_SUCCESS this time so that the request will complete and return to the application. - Because of the nature of directory enumeration, it is possible that the local on-disk representation of a directory hierarchy—using placeholders—may not be complete. For example, when enumerating the path foo\bar\foo1\bar1\5.txt, placeholders may be created for subdirectories foo1 and bar1 and the file 5.txt. However, it could be the case that the directory foo\bar also contains subdirectories foo2 and foo3 (as illustrated in
FIG. 10 ). Placeholders may not have been created for those subdirectories. Thus, the placeholders for the subdirectories foo, bar, foo1, bar1, and 5.txt may form a partial representation of the full directory hierarchy stored remotely on the network. Moreover, it is possible for an application to make changes to the local on-disk representation. For example, an application may create a new file 6.txt in the directory foo\bar\foo1\bar1. Or the application could delete the file 5.txt from that directory or rename the file. According to a further aspect of the storage virtualization techniques described herein, thestorage virtualization filter 204 andstorage virtualization provider 202 may perform a synchronization operation to ensure that any partial representation of the directory hierarchy on disk remains synchronized with the corresponding portion of the full directory hierarchy on the remote storage. - Because a goal of the storage virtualization techniques disclosed herein is to hide the details of the remote storage from applications such that the existence of directories and files appears to an application as if they were all stored and maintained locally, any changes to the on-disk representation by an application should take precedence. Accordingly, when changes are made by the file system in response to a request from an application, such as deleting or renaming a file, a mechanism is needed to inform the
storage virtualization provider 202 during a merge operation that such a change has occurred to ensure that other applications will not be able to open or see this file in subsequent directory enumerations. In accordance with another aspect of the storage virtualization techniques disclosed herein, the concept of a tombstone is introduced. A tombstone is information that remains on the secondary storage of the computer device (e.g., disk 124) after a file or directory represented by a placeholder is deleted or renamed by an application. In one embodiment, a tombstone may be implemented by a new flag or attribute in the metadata of a placeholder for a file or directory that has been deleted. The flag indicates that the file or directory has been deleted or renamed, and thestorage virtualization filter 204 andstorage virtualization provider 202 may cooperate to ensure that the deletion or renaming represented by the tombstone is made to the full directory hierarchy on the remote storage when synchronizing the on-disk and remote storage representations. - Metadata Storage for Placeholders
- With reference to
FIG. 3A , a regular file may containmetadata 302 about the file (e.g., attributes, time stamps, etc.), aprimary data stream 304 that holds the data of the file, and optionally one or more secondary data streams 306. A computing device storing the file may be configured to generate themetadata 302 for the file based on information contained in theprimary data stream 304 of the file. In contrast, as illustrated inFIG. 3B , aplaceholder 308 for a file may comprises:metadata 310 for the file, which may be identical to themetadata 302 of aregular file 300; a sparseprimary data stream 312 which may contain none or some data of the file;information 314 which enables the remotely stored data for the file to be retrieved; and optionally one or more secondary data streams 316. A computing device storing the placeholder for thefile 308 may be unable to generatemetadata 302 for theplaceholder 308 of the file since the sparseprimary data stream 312 may contain none or only a portion of the data needed to generate themetadata 302 about the file. The remainder of the data of the file needed to generate themetadata 302 may be stored remotely by a remote storage provider. - In an example computing device, such as
computing device 112 illustrated inFIG. 4 , an indexer (not shown) may be configured to identify properties of files stored on thecomputing device 112 and to store those properties in a database on thecomputing device 112, such as thesecondary storage 124. For example, one type of property stored in the secondary storage may be properties that are part of the metadata of the file, such as a time stamp or a size of the file. A second type of property stored in the secondary storage may be properties that can be obtained by reading the contents of the file itself, such as an artist or track length in an example that the file is a music file. These properties may be stored in thesecondary storage 124 and later retrieved by the indexer using a search function of thecomputing device 112. However, when some or all of the data associated with the file is being stored remotely by a remote storage provider rather than on the computing device itself, thecomputing device 112 may be unable to generate themetadata 302 for the given file because the indexer does not have access to the contents of the file needed to generate the metadata. Thus, thecomputing device 112 may need to rely on the remote storage provider (e.g., storage virtualization provider 202) to generate themetadata 302. -
FIG. 11 illustrates an example method for receiving metadata associated with a file whose contents are stored remotely and storing that metadata in the secondary storage of a computing device. The method may be implemented in a computing device comprising a processor, memory, and secondary storage, such ascomputing device 112. - At
step 1102, a placeholder for a file may be stored on the secondary storage of the computing device. The secondary storage may be, for example, thedisk storage 124 illustrated inFIG. 1 . The files may comprise data at least some of which is stored on a network remotely from the secondary storage, such as the network (e.g., cloud) 208. The placeholder may be generated by thestorage virtualization filter 204 and may appear to a user or application as a regular file or directory on the computing device. However, the placeholder may not contain all or even any of the data of the file or directory. For example, thestorage virtualization provider 202 may store all or at least some of the data associated with the file in the remote network. Each of the placeholders may comprise a sparse data stream containing none or some data of the file and information which enables the remotely stored data of the file to be retrieved from the network. - At
step 1104, a request to store metadata associated with the file may be received. The request to store metadata associated with the file may be received, for example, by thestorage virtualization filter 204 from theshell 210. Or, in some embodiments, the request may be received directly from an application or other module running on the computing device, such as thestorage virtualization provider 202. Thestorage virtualization filter 204 may create and manage the placeholders for the files and directories, as well as metadata associated with the files and directories, and may notify the user-modestorage virtualization provider 202 of access attempts to the files or directories whose data is managed by thefilter 204 andprovider 202. - At
step 1106, the metadata may be stored by thestorage virtualization filter 204 in a secondary data stream of the placeholder for the given file. The metadata may be stored in the secondary data stream as a Binary Large Object (BLOB). A BLOB may be a collection of binary data (e.g., images, audio or other multimedia objects) stored as a single entity. In one example, the secondary data stream of the placeholder for the given file may hold a plurality of BLOBs, each containing different metadata associated with the file. Each BLOB may store a particular type of metadata. - An example illustration of a secondary data stream of a placeholder in which one or BLOBs may be stored is shown in
FIG. 12 . The secondary data stream may be named based, for example, on one or more characteristics of the secondary data stream. The secondary data stream may have properties similar to those of a primary data stream. For example, read and write operations of the secondary data stream may be performed using the same data stream APIs used for the primary data stream. As shown inFIG. 9 , the secondary data stream may comprise a header for storing information about the secondary data stream and the one or more BLOBs stored in the secondary data stream. For example, a first portion of the header may comprise general information about the secondary data stream, such as the size of the data stream, the location of certain characteristics of the data stream, etc. The header of the secondary data stream may further comprise information about each of the one or more BLOBs stored in the secondary data stream. After the header, the secondary data stream may further comprise a property region for storage of the one or more BLOBs. When more than one BLOB is stored on a data stream, the BLOBs may be offset from one another such that the content of the BLOBs does not overlap. There may also be empty space between BLOBs to allow for growth of one or more of the BLOBs. One or more of the BLOBs may also be compressed using a variety of compression algorithms in the secondary data stream in order to save space. The offset and compression properties of the one or more BLOBs in the secondary data stream may be stored in the header in the form of an index, each BLOB having its own entry in the index that specifies the offset of that BLOB (e.g., in bytes) within the secondary data stream and optionally also any other properties of the BLOB, such as any compression properties. Additionally or alternatively, the offset and compression information may be stored within the BLOB itself. - The
storage virtualization filter 204 illustrated inFIG. 4 may perform the storage of the one or more BLOBs. However, thestorage virtualization filter 204 may not be aware of the properties contained within the BLOBs. In other words, the properties of the BLOBs may be opaque to thestorage virtualization filter 204. In one embodiment, thestorage virtualization filter 204 may simply be aware that there is a BLOB of a certain size with opaque properties, and that some higher level entity (e.g., the shell 210) is acting to store this BLOB or to retrieve this BLOB from the secondary storage. - As further shown in
FIG. 4 , theshell 210 may be run in the user mode of thecomputing device 112. Theshell 210 may facilitate communication between anapplication 130 or thestorage virtualization provider 202 and thestorage virtualization filter 204 running in the kernel mode of thecomputing device 112. For example, theshell 210 may expose an API to at least one of theapplication 130 or thestorage virtualization provider 202 to allow the application or storage virtualization provider to communicate with thestorage virtualization filter 204. In one embodiment, theshell 210 may call a storage virtualization filter API to instruct thestorage virtualization filter 204 to store the one or more BLOBs in the secondary storage, such as thedisk storage 124. Theshell 210 may be capable of accessing the properties of the one or more BLOBs. -
FIG. 13 illustrates an example method 1300 implemented by theshell 210 for the storage virtualization of files. The shell may expose an application program interface (API) for use by at least one of an application or a storage virtualization provider for the storage of metadata in the secondary storage of the computing device. The secondary storage may have stored thereon a placeholder for a file, the file comprising data at least some of which is stored on a network remotely from the secondary storage. The placeholder may comprise a sparse data stream containing none or some data of the file and information which enables the remotely stored data of the file to be retrieved from the network. - At
step 1302, theshell 210 may receive a request to set one or more properties of the file. For example, theshell 210 may receive a request from at least one of anapplication 130 or thestorage virtualization provider 202 to set properties that are part of the metadata of the file, such as a time stamp or a size of the file. Additionally or alternatively, theshell 210 may receive a request from at least one of anapplication 130 or thestorage virtualization provider 202 to set properties that can be obtained by reading the contents of the file itself, such as an artist or track length in an example that the file is a music file. In one embodiment, in which the underlying operating system of the computing device is a WINDOWS operating system available from Microsoft Corporation, the request to set one or more properties of a file may be received in the form of a method call to an iProperty Store interface supported by the operating system. - At
step 1304, theshell 210 may combine the one or more properties into a Binary Large Object (BLOB) and, atstep 1306, theshell 210 may send, to a file system configured to manage the storage of files on the secondary storage, a request to store the BLOB in the placeholder for the given file. In one example, the request to store the BLOB in the placeholder for the given file may comprise a request to store the BLOB in a secondary data stream of the placeholder for the given file. - A BLOB may be associated with a BLOB identifier so that the
shell 210 may associate certain properties with the BLOB based on the BLOB identifier. In one embodiment, the BLOB identifier may be assigned to the BLOB by one of theshell 210 or thestorage virtualization filter 204. The identifier may be a number, such as a 32 bit integer. In one embodiment, the identifier may be a globally unique identifier (GUID). Some of those bits may be reserved for the placement of “flags” that may influence certain behaviors of thestorage virtualization filter 204. For example, a given flag may indicate that the BLOB may only be stored on a placeholder and never on a non-placeholder file. Thus, if that placeholder ever gets converted to a non-placeholder file (e.g., through hydration of the file), thestorage virtualization filter 204 may delete the BLOB with the placeholder only flag. - In one embodiment, an application or the
storage virtualization provider 202 may be configured to communicate with theshell 210 to set or retrieve property values of the one or more BLOBs. In this example, the request to store metadata associated with a given file may originate in the application or thestorage virtualization provider 202. The application or thestorage virtualization provider 202 may be aware of the specific properties of the file. In order to set property values for a given BLOB, the application or thestorage virtualization provider 202 may send a message to theshell 210 requesting that the shell set the properties on the file. In one embodiment, this request may take the form of an IProperty API from the application or storage virtualization provider to the shell. Theshell 210 may then form a BLOB that holds those property values and call a storage virtualization filter API to store the BLOB in the placeholder for the file (e.g., in a secondary data stream of the placeholder) on the secondary storage. - In another example, an
application 130 may want to query a property of a BLOB stored in the secondary storage. For example, theapplication 130 may be a music application that wants to query the author of a given song file. Theapplication 130 may communicate with theshell 210 to retrieve the requested properties from the BLOB. In response to this communication, theshell 210 may retrieve the information from thestorage virtualization filter 204 using an appropriate API call to thestorage virtualization filter 204. - A number of operations may be performed on the one or more BLOBs stored within a placeholder for a file on the secondary storage, such as storing, retrieving, locking, and unlocking a BLOB. However, it is understood that the operations are not limited to these four operations. In order to store or retrieve a BLOB, the
shell 210 may call a store properties API or a retrieve properties API, respectively, of thestorage virtualization filter 204. For example, in response to a request from an application or the storage virtualization provider to set a property of an existing music file, such as the name of an artist of the music file, theshell 210 may form a BLOB containing that property and then call the store properties API of thestorage virtualization filter 204 in order to have the BLOB stored in the placeholder for the file. In order to retrieve the metadata stored in a BLOB, the shell may call the retrieve properties API of thestorage virtualization filter 204 to have the BLOB containing that metadata retrieved from the placeholder for the file. In one embodiment, the APIs may be used to store or retrieve two or more BLOBs at a time. Thus, the operations may operate on a set of BLOBs at once. If the secondary data stream has not been created by the first time a store or retrieve API is called, thestorage virtualization filter 204 may be configured to automatically create the secondary data stream. - The store properties API may be used to update an existing BLOB stored in an alternate data stream. When the store properties API is called to store a BLOB having the same unique identifier as an existing BLOB, the entirety of the existing BLOB may be overwritten with the new BLOB, thus effectively updating it. However, the BLOB identifier may remain unchanged. The store properties API may also be used to delete an existing BLOB. To delete an existing BLOB, the shell may call the store properties API with the identifier of the BLOB to be deleted and an indication that the BLOB has a length of 0. When such a store properties API call is received, the
storage virtualization filter 204 will delete the BLOB. Thus, with the same store properties API, a BLOB may be added, updated, or deleted from the secondary data stream of a placeholder. The retrieve properties API may not modify the secondary data stream at all. - In addition to the shell, other applications, modules, or components may also be able to store, retrieve, update, and retrieve stored BLOBs also. If the shell or an application, for example, wants to perform a series of operations on a particular BLOB and does not want other applications to be able to read that BLOB or make modifications to that BLOB, the application may lock the BLOB using a lock properties API. A given application may lock multiple BLOBs using a single lock properties API call. In one embodiment, there may be two types of locks available to an application: an “exclusive lock” and a “shared lock.” An exclusive lock may give the application exclusive access to the BLOB until the application calls an unlock properties API. No other applications may be able to read or make modifications to the BLOB while a particular application has locked the given BLOB. On the other hand, a shared lock may allow multiple applications to lock a given BLOB at the same time. Thus, application A may be able to request a shared lock on a BLOB even though the BLOB has already been locked by application B. In one embodiment, a shared lock may allow any subsequent lockers to read the BLOB but may not allow the subsequent lockers to make edits. Thus, in the example above, application A may be able to read the properties of the BLOB but may not be able to make changes to the BLOB. In another example, no applications may be able to make modifications to the BLOB while the BLOB is under a shared lock. In yet another example, two or more applications may agree on a set of rules regarding read and write operations to a BLOB under the shared lock. If an application attempts to acquire a lock on multiple BLOBs at once, and one of the BLOBs is already under an exclusive lock, the entire lock operation may fail for all of the BLOBs. Alternatively, the application may be granted a lock on only the BLOBs that are not under an exclusive lock. The
storage virtualization filter 204 may be aware of the specific application that has locked a particular BLOB since thestorage virtualization filter 204 is the component in charge of the store and retrieve operations. - As discussed herein, an
application 130 may communicate with theshell 210 to request that individual property values be set on a file or be added or updated in a given BLOB. The application may identify the BLOB by the BLOB identifier, such as the 32 bit integer (e.g., GUID). The shell may then call a storage virtualization filter API, such as the store properties API, to store the BLOB in the secondary data stream. Thestorage virtualization filter 204 may then store the BLOB in the secondary data stream. In another example, the application may wish to retrieve an individual property of a given BLOB. The application may communicate with the shell to call a storage virtualization filter API, such as the retrieve properties API, causing the storage virtualization filter to find that BLOB in the secondary data stream and pass the contents of the BLOB to the shell. The shell may then retrieve the requested property and return it to the application. - In one embodiment, an application may want to modify a property value stored in an existing BLOB. The shell may determine that the particular value in the BLOB needs to be updated but that there are other properties in the BLOB that must be left alone. In order to address this, the shell may acquire an exclusive lock on the BLOB being changed. The shell may then call a retrieve properties API to read the properties of the BLOB into the shell's memory. The shell may then decode the BLOB so that it knows all of the individual values of the BLOB. The shell may change the property requested by the application to be modified, but may leave all other property values stored in the BLOB unchanged. The shell may then re-encode this set of values into a new BLOB and may call the store properties API to store the new BLOB in the secondary storage. However, the shell will use the same identifier for the new BLOB as the original BLOB. The
storage virtualization filter 204 may then overwrite the old BLOB, and theshell 210 may call the unlock properties API to unlock the BLOB. - The
shell 210 may be configured to sort the one or more BLOBs based on the type of BLOB. In one embodiment, there may be two types of BLOBs in the secondary storage: a storage virtualization provider supplemental properties BLOB and a file format properties BLOB. The storage virtualization provider supplemental properties BLOB may comprise properties that are generated by or provided by astorage virtualization provider 204—and for which the storage virtualization provider may make a request to the shell to store in associate with a file that the storage virtualization provider is managing on remote storage. These properties may be properties that describe the file in the context of the storage virtualization provider, such as whether the file is checked out, who last modified the file, and whether the file is shared between two or more users. In contrast, the file format properties BLOB may contain information that is derivable from the contents of the file itself. In an example that the file is a music file, the file format properties BLOB may store metadata about the artist, number of tracks, the length of each track, and the like. When the file later fully hydrated, the file format properties BLOB may no longer be needed since the contents of the file may be present on the computing device. Thus, when the file is fully hydrated, the file format properties BLOB may be deleted since it would make more sense to use the most up to date information. However, any storage virtualization provider supplemental properties BLOB may remain intact. It is understood that other types of BLOBs may be included as well. In one embodiment, a third category of BLOB may allow an application to add metadata that describes a file. For example, if the application is a photograph application that can perform face recognition, the application may be able to store the names associated with the detected faces as metadata in the BLOB. - The BLOB may be formatted in any number of ways. In one embodiment, a properties store may identify certain properties of the BLOB using, for example, a globally unique identifier (GUI). However, unknown properties may also be stored. These properties may have a value that can be almost any serializable type (e.g., string, Boolean, signed/unsigned integers, etc.). The properties may be serialized into an internal format and then deserialized upon being read. As discussed herein, the BLOB may also be compressed to save room in the secondary storage.
- The illustrations of the aspects described herein are intended to provide a general understanding of the structure of the various aspects. The illustrations are not intended to serve as a complete description of all of the elements and features of apparatus and systems that utilize the structures or methods described herein. Many other aspects may be apparent to those of skill in the art upon reviewing the disclosure. For example, while the methods and system discussed herein have been applied to the use of placeholders in a storage virtualization system, it is understood that the methods and systems may be used for any number of purposes. Other aspects may be utilized and derived from the disclosure, such that structural and logical substitutions and changes may be made without departing from the scope of the disclosure. Accordingly, the disclosure and the figures are to be regarded as illustrative rather than restrictive.
- The various illustrative logical blocks, configurations, modules, and method steps or instructions described in connection with the aspects disclosed herein may be implemented as electronic hardware or computer software. Various illustrative components, blocks, configurations, modules, or steps have been described generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. The described functionality may be implemented in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
- The various illustrative logical blocks, configurations, modules, and method steps or instructions described in connection with the aspects disclosed herein, or certain aspects or portions thereof, may be embodied in the form of computer executable instructions (i.e., program code) stored on a computer-readable storage medium which instructions, when executed by a machine, such as a computing device, perform and/or implement the systems, methods and processes described herein. Specifically, any of the steps, operations or functions described above may be implemented in the form of such computer executable instructions. Computer readable storage media include both volatile and nonvolatile, removable and non-removable media implemented in any non-transitory (i.e., tangible or physical) method or technology for storage of information, but such computer readable storage media do not include signals. Computer readable storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other tangible or physical medium which may be used to store the desired information and which may be accessed by a computer.
- Although the subject matter has been described in language specific to structural features and/or acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as examples of implementing the claims and other equivalent features and acts are intended to be within the scope of the claims.
- The description of the aspects is provided to enable the making or use of the aspects. Various modifications to these aspects will be readily apparent, and the generic principles defined herein may be applied to other aspects without departing from the scope of the disclosure. Thus, the present disclosure is not intended to be limited to the aspects shown herein but is to be accorded the widest scope possible consistent with the principles and novel features as defined by the following claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/991,000 US20230080984A1 (en) | 2017-05-11 | 2022-11-21 | Metadata storage for placeholders in a storage virtualization system |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201762504767P | 2017-05-11 | 2017-05-11 | |
US15/848,519 US11507534B2 (en) | 2017-05-11 | 2017-12-20 | Metadata storage for placeholders in a storage virtualization system |
US17/991,000 US20230080984A1 (en) | 2017-05-11 | 2022-11-21 | Metadata storage for placeholders in a storage virtualization system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/848,519 Continuation US11507534B2 (en) | 2017-05-11 | 2017-12-20 | Metadata storage for placeholders in a storage virtualization system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20230080984A1 true US20230080984A1 (en) | 2023-03-16 |
Family
ID=64097207
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/848,519 Active US11507534B2 (en) | 2017-05-11 | 2017-12-20 | Metadata storage for placeholders in a storage virtualization system |
US17/991,000 Pending US20230080984A1 (en) | 2017-05-11 | 2022-11-21 | Metadata storage for placeholders in a storage virtualization system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/848,519 Active US11507534B2 (en) | 2017-05-11 | 2017-12-20 | Metadata storage for placeholders in a storage virtualization system |
Country Status (4)
Country | Link |
---|---|
US (2) | US11507534B2 (en) |
EP (1) | EP3622416B1 (en) |
CN (1) | CN110622147B (en) |
WO (1) | WO2018208482A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11068351B2 (en) * | 2018-11-19 | 2021-07-20 | International Business Machines Corporation | Data consistency when switching from primary to backup data storage |
US11443052B2 (en) | 2019-03-21 | 2022-09-13 | Microsoft Technology Licensing, Llc | Secure area in a file storage system |
US11269700B2 (en) * | 2019-04-23 | 2022-03-08 | Apple Inc. | System call interception for file providers |
US20210342308A1 (en) * | 2020-04-30 | 2021-11-04 | Unity IPR ApS | System and method for performing context aware operating file system virtualization |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040019613A1 (en) * | 2002-07-25 | 2004-01-29 | Xerox Corporation | Electronic filing system with file-placeholders |
US20050071349A1 (en) * | 2003-08-11 | 2005-03-31 | Jordan Philip Martin | Method and apparatus for accessing multidimensional data |
US20060248038A1 (en) * | 2005-04-29 | 2006-11-02 | Marc Kaplan | System and method of handling file metadata |
US20070185934A1 (en) * | 2006-02-03 | 2007-08-09 | Cannon David M | Restoring a file to its proper storage tier in an information lifecycle management environment |
US20120296870A1 (en) * | 2009-12-31 | 2012-11-22 | Zte Corporation | Method for Finding, Updating and Synchronizing Modified Record Item and Data Synchronizing Device |
US20140324945A1 (en) * | 2013-04-30 | 2014-10-30 | Microsoft Corporation | Hydration and dehydration with placeholders |
US20170060941A1 (en) * | 2015-08-25 | 2017-03-02 | Futurewei Technologies, Inc. | Systems and Methods for Searching Heterogeneous Indexes of Metadata and Tags in File Systems |
US9852117B1 (en) * | 2015-06-01 | 2017-12-26 | Haydn Labs, Inc. | Text-fragment based content editing and publishing |
Family Cites Families (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7158973B2 (en) | 2002-12-12 | 2007-01-02 | Sun Microsystems, Inc. | Method and apparatus for centralized management of a storage virtualization engine and data services |
US7236987B1 (en) | 2003-02-28 | 2007-06-26 | Sun Microsystems Inc. | Systems and methods for providing a storage virtualization environment |
US7610348B2 (en) | 2003-05-07 | 2009-10-27 | International Business Machines | Distributed file serving architecture system with metadata storage virtualization and data access at the data server connection speed |
US7614051B2 (en) * | 2003-12-16 | 2009-11-03 | Microsoft Corporation | Creating file systems within a file in a storage technology-abstracted manner |
JP2007328611A (en) | 2006-06-08 | 2007-12-20 | Hitachi Ltd | Storage virtualization system and method |
US7886183B2 (en) | 2008-08-07 | 2011-02-08 | Symantec Operating Corporation | Providing fault tolerant storage system to a cluster |
US8495036B2 (en) * | 2008-10-24 | 2013-07-23 | Microsoft Corporation | Blob manipulation in an integrated structured storage system |
US9239762B1 (en) | 2009-08-11 | 2016-01-19 | Symantec Corporation | Method and apparatus for virtualizing file system placeholders at a computer |
CN101794219B (en) | 2009-12-30 | 2012-12-12 | 飞天诚信科技股份有限公司 | Compression method and device of .net files |
US8868508B2 (en) * | 2010-02-09 | 2014-10-21 | Google Inc. | Storage of data in a distributed storage system |
US8856089B1 (en) * | 2010-08-27 | 2014-10-07 | Amazon Technologies, Inc. | Sub-containment concurrency for hierarchical data containers |
WO2012042509A1 (en) | 2010-10-01 | 2012-04-05 | Peter Chacko | A distributed virtual storage cloud architecture and a method thereof |
US8924964B2 (en) * | 2010-11-01 | 2014-12-30 | Microsoft Corporation | Dynamic allocation and assignment of virtual environment |
US9020892B2 (en) * | 2011-07-08 | 2015-04-28 | Microsoft Technology Licensing, Llc | Efficient metadata storage |
US9167313B1 (en) | 2011-10-27 | 2015-10-20 | Amazon Technologies, Inc. | Methods and system for transferring data for remote storage |
US8832296B2 (en) | 2011-12-15 | 2014-09-09 | Microsoft Corporation | Fast application streaming using on-demand staging |
US8938550B2 (en) | 2011-12-15 | 2015-01-20 | Microsoft Corporation | Autonomous network streaming |
US9274937B2 (en) | 2011-12-22 | 2016-03-01 | Longitude Enterprise Flash S.A.R.L. | Systems, methods, and interfaces for vector input/output operations |
US20130226876A1 (en) | 2012-02-29 | 2013-08-29 | Construcs, Inc. | Synchronizing local clients with a cloud-based data storage system |
WO2013160930A1 (en) | 2012-04-23 | 2013-10-31 | Hitachi, Ltd. | Storage system and storage virtualization method |
US20130311597A1 (en) | 2012-05-16 | 2013-11-21 | Apple Inc. | Locally backed cloud-based storage |
JP5987498B2 (en) | 2012-06-27 | 2016-09-07 | 富士通株式会社 | Storage virtualization apparatus, storage virtualization method, and storage virtualization program |
US10754699B2 (en) | 2012-08-05 | 2020-08-25 | International Business Machines Corporation | Remote provisioning of virtual appliances for access to virtualized storage |
US9552363B2 (en) * | 2013-04-30 | 2017-01-24 | Microsoft Technology Licensing, Llc | File management with placeholders |
US9405767B2 (en) * | 2013-05-01 | 2016-08-02 | Microsoft Technology Licensing, Llc | Streaming content and placeholders |
US10157186B2 (en) | 2013-07-18 | 2018-12-18 | Microsoft Technology Licensing, Llc | Data handling |
US20150032690A1 (en) | 2013-07-25 | 2015-01-29 | Microsoft Corporation | Virtual synchronization with on-demand data delivery |
US9424062B1 (en) | 2014-03-24 | 2016-08-23 | Amazon Technologies, Inc. | Virtualization infrastructure support |
GB2525613A (en) | 2014-04-29 | 2015-11-04 | Ibm | Reduction of processing duplicates of queued requests |
US10191914B2 (en) * | 2015-03-31 | 2019-01-29 | EMC IP Holding Company LLC | De-duplicating distributed file system using cloud-based object store |
US9870367B2 (en) * | 2016-01-04 | 2018-01-16 | Acronis International Gmbh | System and method of using data blocks to optimize file storage |
US9811575B2 (en) * | 2016-03-30 | 2017-11-07 | Sas Institute Inc. | Dynamic distributed generation of data representations from highly condensed data |
US20180059990A1 (en) | 2016-08-25 | 2018-03-01 | Microsoft Technology Licensing, Llc | Storage Virtualization For Files |
-
2017
- 2017-12-20 US US15/848,519 patent/US11507534B2/en active Active
-
2018
- 2018-04-23 WO PCT/US2018/028768 patent/WO2018208482A1/en unknown
- 2018-04-23 CN CN201880031642.4A patent/CN110622147B/en active Active
- 2018-04-23 EP EP18723255.8A patent/EP3622416B1/en active Active
-
2022
- 2022-11-21 US US17/991,000 patent/US20230080984A1/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040019613A1 (en) * | 2002-07-25 | 2004-01-29 | Xerox Corporation | Electronic filing system with file-placeholders |
US20050071349A1 (en) * | 2003-08-11 | 2005-03-31 | Jordan Philip Martin | Method and apparatus for accessing multidimensional data |
US20060248038A1 (en) * | 2005-04-29 | 2006-11-02 | Marc Kaplan | System and method of handling file metadata |
US20070185934A1 (en) * | 2006-02-03 | 2007-08-09 | Cannon David M | Restoring a file to its proper storage tier in an information lifecycle management environment |
US20120296870A1 (en) * | 2009-12-31 | 2012-11-22 | Zte Corporation | Method for Finding, Updating and Synchronizing Modified Record Item and Data Synchronizing Device |
US20140324945A1 (en) * | 2013-04-30 | 2014-10-30 | Microsoft Corporation | Hydration and dehydration with placeholders |
US9852117B1 (en) * | 2015-06-01 | 2017-12-26 | Haydn Labs, Inc. | Text-fragment based content editing and publishing |
US20170060941A1 (en) * | 2015-08-25 | 2017-03-02 | Futurewei Technologies, Inc. | Systems and Methods for Searching Heterogeneous Indexes of Metadata and Tags in File Systems |
Also Published As
Publication number | Publication date |
---|---|
EP3622416A1 (en) | 2020-03-18 |
WO2018208482A1 (en) | 2018-11-15 |
CN110622147A (en) | 2019-12-27 |
EP3622416B1 (en) | 2024-06-05 |
US20180329905A1 (en) | 2018-11-15 |
CN110622147B (en) | 2024-01-16 |
US11507534B2 (en) | 2022-11-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230080984A1 (en) | Metadata storage for placeholders in a storage virtualization system | |
US10996897B2 (en) | Storage virtualization for directories | |
RU2377646C2 (en) | Systems and methods for providing synchronisation services for information blocks, managed by hardware/software interface system | |
RU2348973C2 (en) | Methods of decompression and compression for maintenance of guidance with properties of files between systems of objects | |
US7676481B2 (en) | Serialization of file system item(s) and associated entity(ies) | |
RU2398275C2 (en) | File system presented inside database | |
US7386531B2 (en) | System and method for managing content | |
US8694497B2 (en) | Method, system, and computer program product for enabling file system tagging by applications | |
JPH07175704A (en) | File device and method for access to data object | |
TW200408980A (en) | System and method for managing file names for file system filter drivers | |
US20090254585A1 (en) | Method for Associating Administrative Policies with User-Definable Groups of Files | |
KR20060112183A (en) | System and method for the presentation of items stored on a computer | |
CN112262378B (en) | Hierarchical hydration of dehydrated documents | |
US20220197867A1 (en) | Ignore objects from syncrhonizing to content management system | |
US7478116B2 (en) | Mechanism to exchange primary data stream of a file |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHRISTIANSEN, NEAL R.;BARKHOUSE, CRAIG ASHLEY;NOVAK, MICHAEL J.;AND OTHERS;SIGNING DATES FROM 20170914 TO 20171004;REEL/FRAME:061839/0484 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |