Patent classifications
G06F3/0646
Method and system for managing storage using an intermediate storage area
Embodiments of the present invention provide a method and a system for managing a storage system. Specifically, in one embodiment of the present invention there is provided a method for managing a storage system, the method comprising: in response to receiving a write request for writing target data to the storage system, writing the target data to an intermediate address range in an intermediate storage area of the storage system; parsing, based on an address mapping of the storage system, a target address range associated with the write request so as to obtain an actual address range; and moving the target data from the intermediate address range to the actual address range. In one embodiment of the present invention there is further provided a corresponding system and apparatus.
DEFENSE AGAINST SPECULATIVE SIDE-CHANNEL ANALYSIS OF A COMPUTER SYSTEM
Embodiments of methods and apparatuses for defending against speculative side-channel analysis on a computer system are disclosed. In an embodiment, a processor includes a decoder, a cache, address translation circuitry, a cache controller, and a memory controller. The decoder is to decode an instruction. The instruction is to specify a first address associated with a data object, the first address having a first memory tag. The address translation circuitry is to translate the first address to a second address, the second address to identify a memory location of the data object. The comparator is to compare the first memory tag and a second memory tag associated with the second address. The cache controller is to detect a cache miss associated with the memory location. The memory controller is to, in response to the comparator detecting a match between the first memory tag and the second memory tag and the cache controller detecting the cache miss, load the data object from the memory location into the cache. Other embodiments include encryption of memory tags together with addresses.
DATA VERIFICATION APPARATUS
A data verification apparatus includes a storage, a management unit, and a verification unit. The storage includes a first storage and a second storage. The first storage stores first data and first status information. The second storage stores second data and second status information. The management unit controls a write process and updates the first status information and the second status information in response to the write process, the write process being a process of writing the first data to the first storage on a basis of data acquired by communication with an external apparatus, and thereafter writing the second data to the second storage on a basis of the data. The verification unit verifies, in a state in which the communication is disconnected, the first data and the second data on a basis of the first status information and the second status information.
Storage system and storage control method
A storage system as a storage cluster recognized as one storage device with respect to a host system specifies a primary volume, to which one or more snapshot volumes are associated, as a migration source primary volume and performs migration processing of migrating at least the migration source primary volume from among the migration source primary volume and a part of the snapshot volumes from a migration source storage device (storage device including specified migration source primary volume and one or more snapshot volume) to a migration target storage device.
Separate memory controllers to access data in memory
A first memory controller receives an access command from a second memory controller, where the access command is timing non-deterministic with respect to a timing specification of a memory. The first memory controller sends at least one access command signal corresponding to the access command to the memory, wherein the at least one access command signal complies with the timing specification. The first memory controller determines a latency of access of the memory. The first memory controller sends feedback information relating to the latency to the second memory controller.
Persistent memory transactions with undo logging
Undo logging for persistent memory transactions may permit concurrent transactions to write to the same persistent object. After an undo log record has been written, a single persist barrier may be issued. The tail pointer of the undo log may be updated after the persist barrier, and without another persist barrier, so the tail update may be persisted when the next log record is written and persisted. Undo logging for persistent memory transactions may rely on inferring the tail of an undo log after a failure rather than relying on a guaranteed correct tail pointer based on persisting the tail after every append. Additionally, transaction version numbers and checksum information may be stored to the undo log enabling failure recovery.
GENERATION OF HOST REQUESTS TO A STORAGE CONTROLLER FOR READ DIAGNOSTIC PARAMETERS FOR A DATA MIRRORING CONFIGURATION
A host is configured to communicate with a storage controller over a first storage area network. A request is transmitted from the host to the storage controller to provide read diagnostic parameters of a second storage area network that is used to mirror data controlled by the storage controller to another storage controller. The host receives the read diagnostic parameters of the second storage area network from the storage controller.
DYNAMIC MANAGEMENT OF EFFECTIVE BANDWIDTH OF DATA STORAGE OPERATIONS
Intelligent data throttling in data movement operations, such as secondary-copy operations in a storage management system. A local throttling manager may intelligently interoperate with co-resident data agents and/or a media agent executing on any given local computing device, whether a client computing device or a secondary storage computing device. The local throttling manager may allocate and manage the available bandwidth for various jobs and their constituent data streamsacross the data agents and/or media agent. Effective bandwidth for the secondary-copy operation may be adjusted based on available bandwidth from the computing device due to increased demand for the bandwidth from other operations, such as services that may be hosted on the computing device.
SHALLOW MEMORY TABLE FOR DATA STORAGE SERVICE
The technology describes shallow memory tables, comprising data maintained at a backup node of a data storage system that contain digest information related to a main node memory table that represents a metadata tree. If the main node fails, the shallow memory table's digest information contains sufficient information to recover the failed main node's memory table data. In response to receiving an update operation at a main node, the main node updates a memory table, journals an update record in a tree-related journal, and sends a digest representing the update to a backup node, which maintains the digest in a shallow memory table. If the main node fails, the backup node transforms the shallow memory table into a memory table by using the digest information to locate the corresponding update journal records. The backup node is able to handle create, read, update and delete requests during the transformation.
UPDATE OF RAID ARRAY PARITY
A RAID controller may update a RAID array by receiving updated data for a first data strip in a set of data strips in the RAID array. The RAID controller may then determine that the first data strip is stored on a device that is experiencing a slow condition. The RAID controller may then force, based on the determining, a promoted stripe write.