Patents by Inventor Wenguang Wang
Wenguang Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12131021Abstract: A method for efficient journal truncation is provided. A method for journal truncation includes maintaining a journal in a memory of a computing system including a plurality of records. Each record indicates a transaction in an ordered data structure. The method includes maintaining a truncation queue in the memory including one or more entries. Each entry in the truncation queue includes a physical on-disk offset associated with a different record of the plurality of records. The method includes determining to truncate the journal and truncating records, of the plurality of records, from the journal starting from a beginning record in the journal up to the record with the physical on-disk offset associated a least recent entry of the one or more entries in the truncation queue, where the truncating includes removing the records from the memory.Type: GrantFiled: September 1, 2022Date of Patent: October 29, 2024Assignee: VMware LLCInventors: Wenguang Wang, Jiaqi Zuo, Hardik Singh Negi, Eric Knauft, Junlong Gao
-
Publication number: 20240354411Abstract: Solutions for rapid ransomware detection and recovery include: receiving a first set of in-memory changed data blocks; identifying, within the first set of in-memory changed data blocks, a second set of in-memory changed data blocks addressed for storage within a file index for a virtual machine (VM) disk; determining, relative to a change history of the file index, an anomalous condition; based on at least determining the anomalous condition, identifying a third set of blocks within the file index that are changed between two versions of the VM disk; determining that changes in the third set of blocks indicate ransomware; and based on at least determining that changes in the third set of blocks indicate ransomware, generating an alert. Machine learning (ML) models may perform anomaly/ransomware detection. Remediation activities may include disk restoration storing the VM memory.Type: ApplicationFiled: June 15, 2023Publication date: October 24, 2024Inventors: Zhe WANG, Wenguang WANG, Enning XIANG, Jianhan ZHAN, Rajesh JOSEPH, Bing JIAO
-
Patent number: 12124701Abstract: Components of a distributed data object are synchronized using streamlined tracking metadata. A target component of the distributed data object is detected as it becomes available and stale. A source component that is up-to-date and that mirrors the address space of the detected target component is identified. A set of mapped address ranges and a set of unmapped address ranges of the identified source component are obtained. A mapped address range of the target component that corresponds with an unmapped address range of the source component is identified. The identified mapped address range of the target component is then synchronized with the corresponding unmapped address range of the source component. Thus, unmapped address ranges are synchronized without using tracking metadata of the source component.Type: GrantFiled: January 25, 2023Date of Patent: October 22, 2024Assignee: VMware LLCInventors: Wenguang Wang, Eric Knauft, Sudheer Thokala
-
Patent number: 12111771Abstract: Linked clone read performance (e.g., retrieving data) is improved at least by minimizing the number of input/output (I/O) operations. For a child clone, a local logical extent and an inherited logical extent are generated. The local logical extent comprises a logical block address (LBA) for data in a data region of the child clone and a physical sector address (PSA) corresponding to the LBA for the data in the data region of the child clone. The inherited logical extent spans logical extents that are accessible to the child clone. The inherited logical extent comprises an LBA for data in a data region of an ancestor of the child clone and a corresponding identifier (ID) of the ancestor. Data for an LBA in a read request may be rapidly found in the child clone (local logical extent) or an ancestor (inherited logical extent).Type: GrantFiled: July 23, 2021Date of Patent: October 8, 2024Assignee: VMware LLCInventors: Enning Xiang, Wenguang Wang
-
Patent number: 12111795Abstract: A method for managing replication of cloned files is provided. Embodiments include determining, at a source system, that a first file has been cloned to create a second file. Embodiments include sending, from the source system to a replica system, an address of the first extent and an indication that a status of the first extent has changed from non-cloned to cloned. Embodiments include changing, at the replica system, a status of a second extent associated with a replica of the first file on the replica system from non-cloned to cloned and creating a mapping of the address of the first extent to an address of the second extent on the replica system. Embodiments include creating, at the replica system, a replica of the second file comprising a reference to the address of the second extent on the replica system.Type: GrantFiled: June 24, 2021Date of Patent: October 8, 2024Assignee: VMware LLCInventors: Abhay Kumar Jain, Sriram Patil, Junlong Gao, Wenguang Wang
-
Patent number: 12056054Abstract: The disclosure describes growing a data cache using a background hash bucket growth process. A first memory portion is allocated to the data buffer of the data cache and a second memory portion is allocated to the metadata buffer of the data cache based on the cache growth instruction. The quantity of hash buckets in the hash bucket buffer is increased and the background hash bucket growth process is initiated, wherein the process is configured to rehash hash bucket entries of the hash bucket buffer in the increased quantity of hash buckets. A data entry is stored in the data buffer using the allocated first memory portion of the data cache and metadata associated with the data entry is stored using the allocated second memory portion of the metadata buffer, wherein a hash bucket entry associated with the data entry is stored in the increased quantity of hash buckets.Type: GrantFiled: August 31, 2022Date of Patent: August 6, 2024Assignee: VMware LLCInventors: Wenguang Wang, Yanxing Pan, Junlong Gao, Mounesh Badiger, Eric Knauft, Vamsidhar Gunturu
-
Publication number: 20240248605Abstract: Components of a distributed data object are synchronized using streamlined tracking metadata. A target component of the distributed data object is detected as it becomes available and stale. A source component that is up-to-date and that mirrors the address space of the detected target component is identified. A set of mapped address ranges and a set of unmapped address ranges of the identified source component are obtained. A mapped address range of the target component that corresponds with an unmapped address range of the source component is identified. The identified mapped address range of the target component is then synchronized with the corresponding unmapped address range of the source component. Thus, unmapped address ranges are synchronized without using tracking metadata of the source component.Type: ApplicationFiled: January 25, 2023Publication date: July 25, 2024Inventors: Wenguang WANG, Eric KNAUFT, Sudheer THOKALA
-
Publication number: 20240250821Abstract: Solutions for secure metering of hyperconverged infrastructures are disclosed. Examples include: receiving a security token; accessing a secondary storage (e.g., cold storage, backups) using the security token; determining usage data for the secondary storage; generating a first message digest for a combination of the usage data and the security token; and transmitting, to a metering server, the usage data and the first message digest. In some examples, the combination of the usage data and the security token comprises a concatenation of the usage data and the security token. In some examples, the metering server requests verification usage data from the secondary storage, generates a second message digest for a combination of the verification usage data and the security token, and compares the first message digest with the second message digest. Examples do not persist the security token on customer premises. Examples leverage the usage data to optimize the secondary storage.Type: ApplicationFiled: April 11, 2023Publication date: July 25, 2024Inventors: Yang YANG, Wenguang WANG, Jin FENG, Wei ZHENG
-
Patent number: 12045204Abstract: The present disclosure provides techniques for deduplicating files. The techniques include creating a cache or subset of a large data structure. The large data structure organizes information by random hash values. The random hash values result in a random organization of information within the data structure, with the information spanning a large number of storage blocks within a storage system. The cache, however, is within memory and is small relative to the data structure. The cache is created so as to contain information that is likely to be needed during deduplication of a file. Having needed information within memory rather than in storage results in faster read and write operations to that information, improving the performance of a computing system.Type: GrantFiled: August 27, 2019Date of Patent: July 23, 2024Assignee: VMware, Inc.Inventors: Wenguang Wang, Junlong Gao, Marcos K. Aguilera, Richard P. Spillane, Christos Karamanolis, Maxime Austruy
-
Patent number: 12021981Abstract: An example method for a first host, being an owner of an object stored in a virtual storage area network (vSAN) cluster, to perform encryption and decryption operations during a rekey in the vSAN cluster is disclosed. The method includes obtaining a first encryption key and a first key identifier (ID) of the first encryption key; transmitting the first key ID and an active key index to a second host; using the first encryption key to perform encryption and decryption operations; and in response to a determination of receiving a key change notification from a master node of the vSAN cluster, terminating a connection with the second host.Type: GrantFiled: March 2, 2022Date of Patent: June 25, 2024Assignee: VMware, Inc.Inventors: Wenguang Wang, Abhay Kuamr Jain, Ruiling Dou, Tao Xie, Xin Li, Chandrakanth Gadhiraju, Kevin Rayfeng Li, Satish Pudi
-
Patent number: 11983407Abstract: A method for performing write operations on a set of one or more physical disks of a set of one or more host machines is provided. The method receives a data block to write on at least one physical disk in the set of physical disks and generates a first set of one or more compressed sectors based on the received data block. The method writes (i) a first entry having a first header and the first set of compressed sectors to a data log that is maintained in a cache, and (ii) the first set of compressed sectors to a bank in memory. The method further determines if a size of data including compressed sectors in the bank satisfies a threshold, and when the size of data in the bank satisfies the threshold, writes the data to the at least one physical disk in the set of physical disks.Type: GrantFiled: March 23, 2020Date of Patent: May 14, 2024Assignee: VMare LLCInventors: Wenguang Wang, Vamsi Gunturu
-
Patent number: 11960450Abstract: The efficiency of segment cleaning for a log-structured file system (LFS) is enhanced at least by storing additional information in a segment usage table (SUT). Live blocks (representing portions of stored objects) in an LFS are determined based at least on the SUT. Chunk identifiers associated with the live blocks are read. The live blocks are coalesced at least by writing at least a portion of the live blocks into at least one new segment. A blind update of at least a portion of the chunk identifiers in a chunk map is performed to indicate the new segment. The blind update includes writing to the chunk map without reading from the chunk map. In some examples, the objects comprise virtual machine disks (VMDKs) and the SUT changes between a list format and a bitmap format, to minimize size.Type: GrantFiled: August 21, 2020Date of Patent: April 16, 2024Assignee: VMware, Inc.Inventors: Wenguang Wang, Ilia Langouev, Vamsi Gunturu, Junlong Gao
-
Publication number: 20240111722Abstract: Deleting directories in a virtual distributed file system (VDFS), and non-virtual file systems, involves changing the name of a selected directory to a unique object identifier (UID) and moving the selected directory, named according to the UID, to a deletion target directory. A recursive process, implemented using a background deletion thread, starts in the current directory and identifies objects in the current directory. For an object that is a file or an empty directory, the object is added to a deletion queue. For an object that is a directory that is not empty, the recursion drops down into that directory as the new current directory. When the recursion has exhausted the selected directory, or some maximum object count has been reached, the objects identified in the deletion queue are deleted. This approach can also be used for file operations other than deletion, such as compression, encryption, and hashing.Type: ApplicationFiled: November 21, 2022Publication date: April 4, 2024Inventors: Xiaohua FAN, Zhaohui GUO, Wenguang WANG, Kiran PATIL, Abhay Kumar JAIN
-
Publication number: 20240086391Abstract: Systems and methods for inspection and repair of VSAN object metadata. A user-space indirection layer is maintained to map logical addresses of VSAN objects to physical memory addresses of their metadata. Commands may then be sent from the user space to distributed object manager (DOM) clients, with the physical addresses of metadata of objects to be inspected. DOM owners thus may bypass their own indirection layers to retrieve object metadata directly from received user commands. Retrieved information is then used to reconstruct and repair object metadata. Repaired metadata may be written back to the VSAN by transmitting a write request containing the physical address at which the repaired metadata is to be written. DOM owners may be placed in a specified mode in which received I/O instructions are ignored unless they are designated as being for metadata repair purposes, such as by including a physical address.Type: ApplicationFiled: September 8, 2022Publication date: March 14, 2024Applicant: VMware, Inc.Inventors: Kevin Rayfeng LI, Wenguang WANG, Quanxing LIU, Pascal RENAULD, Kiran PATIL
-
Publication number: 20240078179Abstract: A method for efficient write-back for journal truncation is provided. A method includes maintaining a journal in a memory of a computing system including a plurality of records. Each record indicates a transaction associated with one or more pages in an ordered data structure and maintaining a dirty list including an entry for each page indicated by a record in the journal. Each entry in the dirty list includes a respective first log sequence number (LSN) associated with a least recent record of the plurality of records that indicates the page and a respective second LSN associated with a most recent record of the plurality of records that indicates the page. The method includes determining to truncate the journal. The method includes identifying one or more records, of the plurality of records, from the journal to write back to a disk, where the identifying is based on the dirty list.Type: ApplicationFiled: September 1, 2022Publication date: March 7, 2024Inventors: Jiaqi ZUO, Junlong Gao, Wenguang Wang, Eric Knauft, Hardik Singh Negi
-
Publication number: 20240078010Abstract: A method for efficient journal truncation is provided. A method for journal truncation includes maintaining a journal in a memory of a computing system including a plurality of records. Each record indicates a transaction in an ordered data structure. The method includes maintaining a truncation queue in the memory including one or more entries. Each entry in the truncation queue includes a physical on-disk offset associated with a different record of the plurality of records. The method includes determining to truncate the journal and truncating records, of the plurality of records, from the journal starting from a beginning record in the journal up to the record with the physical on-disk offset associated a least recent entry of the one or more entries in the truncation queue, where the truncating includes removing the records from the memory.Type: ApplicationFiled: September 1, 2022Publication date: March 7, 2024Inventors: Wenguang WANG, Jiaqi Zuo, Hardik Singh Negi, Eric Knauft, Junlong Gao
-
Publication number: 20240070080Abstract: The disclosure describes growing a data cache using a background hash bucket growth process. A first memory portion is allocated to the data buffer of the data cache and a second memory portion is allocated to the metadata buffer of the data cache based on the cache growth instruction. The quantity of hash buckets in the hash bucket buffer is increased and the background hash bucket growth process is initiated, wherein the process is configured to rehash hash bucket entries of the hash bucket buffer in the increased quantity of hash buckets. A data entry is stored in the data buffer using the allocated first memory portion of the data cache and metadata associated with the data entry is stored using the allocated second memory portion of the metadata buffer, wherein a hash bucket entry associated with the data entry is stored in the increased quantity of hash buckets.Type: ApplicationFiled: August 31, 2022Publication date: February 29, 2024Inventors: Wenguang WANG, Yanxing PAN, Junlong GAO, Mounesh BADIGER, Eric KNAUFT, Vamsidhar GUNTURU
-
Patent number: 11917003Abstract: Examples disclosed herein relate to propagating changes made on a file system volume of a primary cluster of nodes to the same file system volume also being managed by a secondary cluster of nodes. An application is executed on both clusters, and data changes on the primary cluster are mirrored to the secondary cluster using an exo-clone file. The exo-clone file includes the differences between two or more snapshots of the volume on the primary cluster, along with identifiers of the change blocks and (optionally) state information thereof. Just these changes, identifiers, and state information are packaged in the exo-clone file and then exported to the secondary cluster, which in turn makes the changes to its version of the volume. Exporting just the changes to the data blocks and the corresponding block identifiers drastically reduces the information needed to be exchanged and processed to keep the two volumes consistent.Type: GrantFiled: October 2, 2020Date of Patent: February 27, 2024Assignee: VMware, Inc.Inventors: Richard Spillane, Yunshan Luke Lu, Wenguang Wang, Maxime Austruy, Christos Karamanolis, Rawlinson Rivera
-
Patent number: 11907161Abstract: An example method of upgrading a distributed storage object from a first version to a second version includes: querying metadata of a first component configured according to the first version of the distributed storage object, the metadata defining extents of data on a disk group of the first component; populating, for a second component configured according to the second version of the distributed storage object, logical and middle maps based on the metadata such that initial entries in the logical map point to initial entries in the middle map, and the initial entries in the middle map point to physical addresses of the disk group of the first component; and reading the data from the disk group of the first component and writing the data to a disk group of the second component while updating the initial entries in the middle map.Type: GrantFiled: July 2, 2021Date of Patent: February 20, 2024Assignee: VMware, Inc.Inventors: Asit Desai, Abhay Kumar Jain, Wenguang Wang, Eric Knauft, Enning Xiang
-
Patent number: 11886307Abstract: The location of resources for file services are located within the same site, thereby eliminating or reducing performance issues caused by cross-site accesses in a stretched cluster environment. A file server placement algorithm initially places file servers at a site based at least in part on host workload and affinity settings, and can perform failover to move the file servers to a different location (e.g., to a different host on the same site or to another site) in the event of a failure of the host where the file servers were initially placed. File servers may be co-located with clients at a location based on client latencies and site workload. Failover support is also provided in the event that the sites in the stretched cluster have different subnet addresses.Type: GrantFiled: September 6, 2021Date of Patent: January 30, 2024Assignee: VMware, Inc.Inventors: Yang Yang, Ye Zhang, Wenguang Wang, Haifeng Li