Patent classifications
G06F11/16
APPARATUS AND METHOD TO ENABLE A CORRECTED PROGRAM TO TAKE OVER DATA USED BEFORE CORRECTION THEREOF
An apparatus causes a program loader to load a first program and a second program that is obtained by correcting the first program, into a memory, and causes a linker to load a library used for execution of the second program into the memory. The apparatus writes first data that has been processed at a suspension time at which execution of the first program is suspended, into a first data area for the first program loaded into the memory, and starts execution of the second program from a second position on the second program corresponding to a first position where execution of the first program is suspended.
TECHNIQUES FOR AVOIDING AND REDUCING DATA UNAVAILABILITY
A clustered pair of storage systems configured for active-active bidirectional synchronous replication expose a stretched volume over paths to both storage systems. Writes to the stretched volume received at each system are replicated to the peer system. The cluster can use a time-to-live (TTL) mechanism by which a non-preferred system continuously requests a TTL grant from the preferred system to remain in the cluster. Algorithms that reduce or avoid data unavailability are described and can include assessing the health of the systems in the cluster. An unhealthy system can trigger a one-sided polarization algorithm to notify the peer system that it is polarization winner. An improved polarization technique using a witness to decide the polarization winner includes a system adding a time delay before contacting the witness if the system is unhealthy. A control component can detect an unhealthy system and disable the active-active bidirectional synchronous replication.
Storage Unit Validating Requests for a Storage Vault
A system includes a plurality of storage units each including a network port operably coupled to the network, where one or more storage vaults is associated with the plurality of storage units and each storage vault of the one or more storage vaults represents a software-constructed grouping of storage units of the plurality of storage units, where the software-constructed grouping of storage units stores encoded data slices, where a data segment is encoded using an information dispersal algorithm to produce the encoded data slices, and where a storage unit: receives, via the network port, a request regarding the data segment stored in the software-constructed grouping of storage units, obtains, from a data structure pertaining to the software-constructed grouping of storage units, information regarding the request, determines whether the request is valid based on the information regarding the request, and when the request is valid, the storage unit executes the request.
Common server san core solution to enable software defined storage
In an aspect of the disclosure, a method, a computer-readable medium, and a computer system are provided. The computer system includes a baseboard management controller (BMC). The BMC receives a first message from a first remote device on a management network. The BMC determines whether the first message is directed to a storage service or fabric service running on a host of the BMC. The host is a storage device. The BMC extracts a service management command from the first message, when the first message is directed to the storage service or fabric service. The BMC sends, through a BMC communication channel to the host, a second message containing the service management command to the host. The BMC communication channel established for communicating baseboard management commands between the BMC and the host.
Toke Based Communication
A method for authorizing I/O (input/output) commands in a storage cluster is provided. The method includes generating a token responsive to an I/O command, wherein the token is specific to assignment of a storage node of the storage cluster. The method includes verifying the I/O command using the token, wherein the token includes a signature confirming validity of the token and wherein the token is revocable.
SEQUENTIAL RESETS OF REDUNDANT SUBSYSTEMS WITH RANDOM DELAYS
Example implementations relate to sequential resets of redundant subsystems. For example, in an implementation, a controller may receive a maintenance activity instruction and may perform the maintenance activity on the redundant subsystems. After performance of the redundant subsystems, the controller may sequentially reset each of the redundant subsystems. The controller may wait a random delay between sequential resets of the redundant subsystems.
Backup memory administration using an active memory device and a backup memory device
Methods, systems, and computer program products for backup memory administration are provided. Embodiments include storing in an active memory device, by a memory backup controller, blocks of computer data received from random access memory; recording in a change log, by the memory backup controller, identifications of each block of computer data that is stored in the active memory device; detecting, by the memory backup controller, a backup trigger event; and responsive to the detecting of the backup trigger event: copying, by the memory backup controller, from the active memory device, to a backup memory device, the blocks of data identified in the change log; and clearing, by the memory backup controller, the change log.
Redundant Array of Independent Disks Card, Command Processing Method, and Storage Apparatus and System
A redundant array of independent disks card, a command processing method, a storage apparatus and system are provided. The redundant array of independent disks card includes a control module and N front-end modules, where N is a positive integer greater than or equal to 2. An n.sup.th front-end module in the N front-end modules is configured to receive a command from an n.sup.th host module in N host modules, and send the received command to the control module. The control module is configured to receive commands from the N front-end modules and process the received commands. A storage apparatus provided with the redundant array of independent disks card can recover faulty data more quickly during data recovery. In addition, a more flexible erasure code scheme can be implemented by using the redundant array of independent disks card.
OPPORTUNISTIC SOFTWARE UPDATES DURING SELECT OPERATIONAL MODES
Disclosed embodiments relate to opportunistically updating Electronic Control Unit (ECU) software in a vehicle. Operations may include receiving, at a controller in a vehicle, a wireless transmission indicating a need to update software running on at least one ECU in the vehicle; monitoring an operational status of the vehicle to determine whether the vehicle is in a first mode of operation in which an ECU software update is prohibited; delaying the ECU software update when the operational status is prohibited; continuing to monitor the operational status of the vehicle to determine whether the vehicle is in a second mode of operation in which the ECU software update is permitted; and enabling updating of the at least one ECU with the delayed ECU software update when it is determined that the vehicle is in the second mode of operations.
HARDWARE CONTROL PATH REDUNDANCY FOR FUNCTIONAL SAFETY OF PERIPHERALS
A circuit includes a primary register region and a primary shadow register; a secondary register region and a secondary shadow register; and a safety controller having multiple states. The safety controller transitions to a first write state when a first write signal to write a first value to the primary register region is detected, and copies the first value written to the primary register region to the primary shadow register; transitions to a second write state when a second write signal to write a second value to the secondary register region is detected within a set amount of time of detection of the first write signal, and in the second write state, copies the second value written to the secondary register region to the secondary shadow register; transitions to a compare state to receive a comparison signal indicating whether the first value is the same as the second value; and transitions to an update state when the first value is the same as the second value.