Patent classifications
G06F3/0646
Storage Optimization for Serverless Functions
An illustrative method includes a storage-aware serverless function management system determining a status of a serverless system that implements one or more serverless functions configured to access one or more components of a storage system, determining a utilization of the storage system, and requesting that the storage system adjust storage of data in the storage system based on the status of the serverless system and the utilization of the storage system.
Restoring messages to a memory utilized by a topic in a publish-subscribe environment
An apparatus manages memory utilization by a topic in a publish-subscribe environment, wherein the topic is a logical container for the messages and one or more of the messages can be published to the topic by a publishing entity for delivery of the one or more messages to one or more subscribers of the topic. The apparatus includes a primary memory device that stores a first set of messages published to the topic and a secondary memory device that stores a second set of messages previously transferred to the secondary memory device. The apparatus further includes a processor configured to monitor utilization of a portion of the primary memory device assigned to the topic and detect that the utilization has dropped below a threshold. In response, the processor is configured to forward a portion of the second set of messages from the secondary memory device to the primary memory device.
Storage device feature extraction optimization
Systems and methods for compacting and anonymizing telemetry data in a storage system. A controller of a storage device may generate telemetry data based on collected features indicative of the performance of the storage device. The controller may store the telemetry data in the telemetry memory of the storage device. The controller may then transform the telemetry data into transformed telemetry data based on a dimension reduction algorithm, and transmit the transformed telemetry data to the host device.
Memory region allocation to a software program
Embodiments of methods and apparatuses for defending against speculative side-channel analysis on a computer system are disclosed. In an embodiment, a processor includes a decoder, a cache, address translation circuitry, a cache controller, and a memory controller. The decoder is to decode an instruction. The instruction is to specify a first address associated with a data object, the first address having a first memory tag. The address translation circuitry is to translate the first address to a second address, the second address to identify a memory location of the data object. The comparator is to compare the first memory tag and a second memory tag associated with the second address. The cache controller is to detect a cache miss associated with the memory location. The memory controller is to, in response to the comparator detecting a match between the first memory tag and the second memory tag and the cache controller detecting the cache miss, load the data object from the memory location into the cache. Other embodiments include encryption of memory tags together with addresses.
NETWORK INTERFACE CARD, CONTROLLER, STORAGE APPARATUS, AND PACKET SENDING METHOD
This application discloses a network interface card, a controller, a storage apparatus, and a packet sending method, and relates to the storage field to reduce a delay of an RDMA read operation. The network interface card includes: a second processing module, configured to: in response to a doorbell signal of a first controller, obtain a first work queue element WQE from a first send queue SQ corresponding to the first controller, where the doorbell signal indicates that there is a to-be-sent message in a storage space to which at least one WQE points in the first SQ, the first WQE includes indication information, and the indication information indicates a type of a first remote direct memory access RDMA packet scheduled by the first WQE; and a second transceiver module, configured to.
Zero copy message reception for applications
Zero copy message reception for guests is disclosed. For example, a host has a memory, a device with access to device memory addresses, a processor, and a supervisor. An application with access to application memory addresses (AMA) executes on the host. An AMA is mapped to a page table entry (PTE). The application shares access to a first page of memory addressed by the AMA with the device to store data received by the device for the first application, where the first page is mapped as a device memory address of the plurality of device memory addresses. The application later sends a request to disconnect from the device. The supervisor is configured to copy contents of the first page to a second page in the memory after receiving the request to disconnect, and then update the PTE to address the second page instead of the first page.
Method, device, and computer program product for storage management
Techniques involve: determining a first group of storage disks, a use rate of each storage disk of the first group of storage disks exceeding a first threshold, the first group of storage disks comprising a first group of storage blocks corresponding to a first redundant array of independent storage disk (RAID); allocating a second group of storage blocks corresponding to a second RAID from a second group of storage disks, the second group of storage blocks having the same size as that of the first group of storage blocks, a use rate of each storage disk of the second group of storage disks being under a second threshold; moving data in the first group of storage blocks to the second group of storage blocks; and releasing the first group of storage blocks from the first group of storage disks. Thus, use rates of the storage disks become more balanced.
Computer system and communication management method
When a communication protocol is changed, the I/O function can be appropriately provided. In a computer system, a storage node includes a CPU and a storage control program that performs communication relating to data I/O. The storage control program has a first storage control program that is capable of using a first communication protocol, and a second storage control program that is capable of using the first communication protocol and a second communication protocol. The control node the control node causes, when any storage node of the plurality of storage nodes is capable of executing the first storage control program alone, all storage nodes to perform communication using the first communication protocol. The control node causes, after all storage nodes of the plurality of storage nodes are enabled to execute the second storage control program, the all storage nodes to perform communication using the second communication protocol.
PRESERVING DATA IN A STORAGE SYSTEM OPERATING IN A REDUCED POWER MODE
Preserving data in a storage system operating in a reduced power mode, including: detecting that the storage system should enter the reduced power mode; and entering the reduced power mode, including performing, while in the reduced power mode, one or more maintenance operations on one or more storage devices in the storage system.
MEMORY CONTROLLER AND METHOD OF OPERATING THE SAME
A memory controller and a method of operating the same may provide recovery from a Sudden Power-Off (SPO). The memory controller may control a memory device including a plurality of memory blocks, each memory block having a plurality of pages. The memory controller may include a dummy program controller configured to, after an SPO has occurred while a program operation was being performed on a page of the memory device, control a dummy program operation for recovering from the SPO; a parity data controller configured to control resetting and generation of parity data for chipkill decoding based on pages on which the dummy program operation is determined to be performed; and a valid data controller configured to control movement of valid data based on a number of pages on which the dummy program operation is to be performed.