G06F11/0727

Techniques for command execution using a state machine

Techniques for processing a request may include: providing tasks to a state machine framework, wherein the tasks perform processing of a workflow for servicing the request; generating, by the state machine framework, a state machine for processing the request, wherein the state machine includes states associated with the tasks, wherein generating the state machine may include automatically determining a first state transition of the state machine between a first and a second of the states; receiving the request; and responsive to receiving the request, performing first processing using the state machine to service the request. The framework may automatically generate triggers that drive the state machine to determine subsequent states in accordance with defined state transitions. State machine internal state information may be persistently stored and used in restoring the state machine to one of its states in connection processing of the command.

Enabling devices with enhanced persistent memory region access

A system includes a first memory device including a non-volatile memory device, a second memory device and a processing device, operatively coupled with the first memory device and the second memory device, to perform operations including configuring a system in accordance with a configuration designating an interface standard for exposing a storage element implemented on the first memory device to a first protocol of the interface standard and a persistent memory region (PMR) implemented on the second memory device to a second protocol of the interface standard, and performing at least one system operation based on the configuration.

Apparatus configured to perform a repair operation
11693564 · 2023-07-04 · ·

An apparatus includes a storage area signal generation circuit configured to generate a storage area signal when performing an internal information storage operation and an external information storage operation; and an information storage circuit configured to receive internal failure information, stored in the apparatus, based on the storage area signal and store the received internal failure information as failure information in a set storage capacity, and store external failure information, applied from outside the apparatus, as the failure information in a variable storage capacity.

DATA TAPE MEDIA ACTION RECOMMENDATION BASED ON MEDIA DRIVE CALIBRATION

Techniques for generating action recommendations for a data tape system based on a media drive calibration are disclosed. A system receives a request to perform an operation including an exchange between a data tape and a media drive. If the system determines that the operation is a data tape validation operation, the system determines whether the media drive is calibrated. If the calibration value of the media drive does not meet a threshold, the system performs a calibration procedure. The system may calibrate the media drive or replace the media drive with a calibrated media drive. The system performs the validation operation. Based on a validation result, a data tape quality value, and the media drive calibration value, the system generates a recommended action for a data tape.

Assignment of quora values to nodes based on importance of the nodes

Embodiments described herein are generally directed to techniques for avoiding or mitigating shared-state damage during a split-brain condition in a distributed network of compute nodes. According to an example, a number, N, of nodes within the distributed computing system is determined. During normal operation of the distributed computing system, a unified state is maintained by synchronizing shared state information. The nodes are ordered by increasing importance to an application from 1 to N. A quora value, q.sub.n, is assigned to each of the nodes in accordance with the ordering, where q.sub.1=1 and each subsequent quora value, q.sub.n+1, is a sum of all prior quora values, q.sub.1 to q.sub.n, plus either 1 or a current value of n. These quora values may then be used to determine membership in the dominant or a yielding set to facilitate recovery from the split-brain condition by performing pessimistic or optimistic mitigation actions.

Resolving erred 10 flows
11544139 · 2023-01-03 · ·

A method for resolving an erred input/output (IO) flow, the method may include (i) sending over a path a remote direct write request associated with a certain address range; wherein the path is formed between a compute node of a storage system to a storage drive of the storage system; (ii) receiving by the compute node an error message related to the remote direct write request; wherein the error message does not indicate whether an execution of the remote direct write request failed or is only temporarily delayed; (iii) responding by the compute node to the error message by (a) preventing from sending one or more IO requests through the path, (b) preventing from sending at least one IO requests aimed to the certain address range; and (c) requesting, using a management communication link, to force an execution of pending IO requests that are related to the path; and (iv) reuse the path, by the compute node, following an indication that there are no pending IO requests that are related to the path.

PARTIAL SUPERBLOCK MEMORY MANAGMENT

An apparatus can include a partial superblock memory management component. The partial superblock memory management component can identify bad blocks in respective planes of a block of non-volatile memory cells. The partial superblock memory management component can determine that a plane of the respective planes includes at least good block in at least one different block of non-volatile memory cells. The partial superblock memory management component can perform an operation to reallocate the at least one good block in the plane to the at least one bad block in the plane to form blocks of non-volatile memory cells having a quantity of bad blocks that satisfies a bad block threshold.

STORAGE SYSTEM
20220413981 · 2022-12-29 ·

A first storage controller includes a first input and output controller performs input and output processing on host data, and a first management controller. A second storage controller includes a second input and output controller performs input and output processing on host data, and a second management controller. The first management controller is configured to verify software to be executed by the first management controller and software to be executed by the first input and output controller. The second management controller is configured to verify software to be executed by the second management controller and software to be executed by the second input and output controller. The first management controller is configured to verify the software to be executed by the second input and output controller in place of the second management controller when a failure is detected from the second management controller.

Server and method of identifying unsupported drives in a server

A method of identifying an unsupported storage device on a server is disclosed as including providing the server with a baseboard management controller (BMC), the BMC obtaining vital product data (VPD) from a storage device on the server, the BMC comparing the VPD from the storage device with one or more approved VPDs, and the BMC issuing an output in response to said comparison.

ANOMALY DETECTION FROM LOG MESSAGES

Methods and apparatus are provided. In an example aspect, a method of anomaly detection from log messages is provided. The method comprises determining whether at least a portion of a log message generated by a computing system matches one or more of a plurality of Bloom filters, wherein each Bloom filter is associated with one or more respective predefined log messages and one or more respective database keys, and each database key is associated with one of the predefined log messages in a database. The method also comprises, if the at least the portion of the log message matches the one or more Bloom filters, for each of the one or more Bloom filters, determining whether the at least a portion of the log message matches any of the one or more associated predefined log messages by performing a lookup of the database using the associated one or more database keys.