Patent classifications
G06F11/1438
COMPUTING DEVICE, REDUNDANT SYSTEM, PROGRAM, AND METHOD FOR CONSTRUCTING REDUNDANT CONFIGURATION
A computing device for configuring a redundant system includes: a detection unit configured to detect another computing device newly added to the redundant system during operation of the computing device; and a construction processing unit configured to execute construction processing for constructing a redundant configuration with the other computing device. The construction processing unit includes a first transmission unit for identifying construction start state information, and transmitting the construction start state information to the other computing device, and a second transmission unit for repeatedly performing identification of a change difference that arises in the state information as a result of computing processing of the computing device performed after identifying the construction start state information, from a time when the construction start state information was identified or a time when a previous timing was reached, and transmission of the change difference to the another computing device.
METHOD FOR HANDLING TRUSTED EXECUTION ENVIRONMENT OPERATING SYSTEM CRASH AND ELECTRONIC DEVICE
A method for handling a trusted execution environment operating system crash is provided. The method includes: when it is detected, in a running process of a security service, that a TEE OS crashes, an electronic device stores a hardware status parameter of a TEE and a security context of an REE that are obtained when the TEE OS crashes, and suspends the security service; the electronic device restarts the TEE OS; the electronic device sets, based on the stored hardware status parameter of the TEE, a hardware status parameter of the TEE obtained after the TEE OS is restarted; the electronic device sets, based on the stored security context of the REE, a security context of the REE obtained after the TEE OS is restarted and a context of the TEE obtained after the TEE OS is restarted; and the electronic device restores the security service.
MEMORY LEAK DETECTION USING REAL-TIME MEMORY GROWTH PATTERN ANALYSIS
The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.
VIRTUAL MACHINE FILE MANAGEMENT USING FILE-LEVEL SNAPSHOTS
VM file management includes detecting a user request to access to a virtual machine (VM) and searching a pre-defined list to determine whether the user requesting access is identified on the list. If so, a file-level snapshot is generated prior to enabling modification of a VM file by the user. The file-level snapshot includes a user attribute and is added as the top layer of a stack. The user attribute indicates a role of the user for whom the file-level snapshot is created. Each layer of the stack contains one or more other file-level snapshots. The VM file is written in the file's entirety to the snapshot in response to the user modifying the VM file. Based on the user attribute of each snapshot, a set of snapshots is selected from the stack, and the VM is modified by merging the VM files belonging to the set of snapshots selected.
DETECTING AND RECOVERING A CORRUPTED NON-VOLATILE RANDOM-ACCESS MEMORY
An information handling system inclues a memory manager that may detect corruption of a non-volatile random-access memory, and perform a recovery process of the non-volatile random-access memory that includes determining whether a header of the non-volatile random-access memory is corrupted. If the header is not corrupted, then a data region associated with the header may be recovered from recovery data values in a spare store in the non-volatile random-access memory. If the header is corrupted, then the header and the data region may be recovered from default data values.
TECHNIQUES FOR RECOVERING FROM ERRORS WHEN EXECUTING SOFTWARE APPLICATIONS ON PARALLEL PROCESSORS
In various embodiments, a software program uses hardware features of a parallel processor to checkpoint a context associated with an execution of a software application on the parallel processor. The software program uses a preemption feature of the parallel processor to cause the parallel processor to stop executing instructions in accordance with the context. The software program then causes the parallel processor to collect state data associated with the context. After generating a checkpoint based on the state data, the software program causes the parallel processor to resume executing instructions in accordance with the context.
IN-PLACE CLOUD INSTANCE RESTORE
The disclosed technology teaches recovering a first virtual machine or an instance with an Internet Protocol address, a first root volume and one or more data volumes that are corrupted. The first virtual machine is hosted by a first cloud server that hosts plurality of virtual machines. The disclosed technology includes instructing the first cloud server to launch a recovery virtual machine. The recovery virtual machine launches one or more new data volumes based upon captured file system images in one or more snapshots taken of corrupted data volumes of the first virtual machine prior to becoming corrupted. The recovery virtual machine detaches the corrupted data volumes and attaches the new data volumes launched to the first virtual machine. The Internet Protocol address of the first virtual machine remains unchanged.
Memory first live snapshot
The subject matter of this specification can be implemented in, among other things, a method including creating a new disk file at a reference point-in-time, wherein an original disk file is a backing file of the new disk file, copying the original disk file to a disk snapshot file, in response to the original disk file being copied to the disk snapshot file, merging the original disk file and the new disk file to form a merged file, wherein a virtual machine is to continue to perform disk operations using the merged file, and determining whether the merged file is synchronized with the original disk file and the new disk file by determining whether entries of a bitmap for the merged file match corresponding entries of a bitmap for the new disk file.
Virtual machine
A computer-implemented method for executing a software application in a virtual machine executing on a data processing device includes receiving software code for a software application, determining application programming interfaces referenced by the software code, determining portions of an operating system accessed by the software code and creating an application container in the virtual machine. The method also includes application programming interfaces referenced by the software code inside the application container, portions of the operating system accessed by the software code inside the application container and executing the software application inside the application container on the virtual machine.
METHODS, DEVICES AND SYSTEMS FOR WRITER PRE-SELECTION IN DISTRIBUTED DATA SYSTEMS
A computer-implemented method may comprise receiving proposals to mutate a data stored in a distributed and replicated file system coupled to a network, the distributed and replicated data system comprising a plurality of nodes, each comprising a server. A metadata service maintains and updates a replica of a namespace of the distributed and replicated file system and coordinates updates to the data by generating an ordered set of agreements corresponding to the received proposals, the ordered set of agreements specifying an order in which the nodes are to mutate data stored in data nodes and cause corresponding changes to the state of the namespace. For each agreement in the generated ordered set of agreements, a corresponding writers list may be provided that comprises an ordered list of nodes to execute the agreement and make corresponding changes to the namespace. The ordered set of agreements may then be sent to the plurality of nodes along with, for each agreement in the ordered set of agreements, the corresponding writers list or a pre-generated index thereto and each of the plurality of nodes may be configured to only execute agreements for which it is a first-listed node on the received writers list.