Patent application number | Description | Published |
20080229431 | System and Method to Manage Device Access in a Software Partition - A system and method to manage device access in a software partition are provided. The illustrative embodiments provide a mechanism for exporting resources/devices from an administrator partition to a software partition in its purview. A trusted device list data structure is provided that identifies which devices are permitted to be exported into a software partition from an administrative partition. This trusted device list data structure also identifies which of the devices in the list of devices should be exported by default when exporting devices to a software partition, i.e. if no overrides are specified. In addition, a user-specifiable mechanism to override the entries in the trusted device list data structure is provided. For security purposes, this mechanism may not be used to export devices not listed in the trusted device list data structure. The mechanism may also be used to prevent the exporting of devices which are exported by default. | 09-18-2008 |
20080267176 | SELECTIVE PRESERVATION OF NETWORK STATE DURING A CHECKPOINT - A computer implemented method, data processing system, and computer program product for selectively preserving network state during a checkpoint operation. Packets flowing through a network stack are examined to determine whether the packets belong to a WPAR under checkpoint. If one or more packets belong to a WPAR under checkpoint, a filter is used to block the packets from flowing through the network stack. Address information in each blocked packet is checked against an access list of allowed communications to determine if the access list indicates that a packet is an allowed packet. If the access list indicates that one of the packets is an allowed packet, that packet is unblocked and allowed to continue flowing through the network stack during the checkpoint operation. If the access list indicates that another of the packets is not an allowed packet, that packet is discarded during the checkpoint operation. | 10-30-2008 |
20090037718 | BOOTING SOFTWARE PARTITION WITH NETWORK FILE SYSTEM - In a software partition (SWPAR) environment, a method, system and computer program product enables a SWPAR to be remotely booted, independent of the booting of the OS on the global system environment, using network file system (NFS) services and protocols. A request to mount a NFS, hosted by an external server into a SWPAR environment is transmitted. The NFS services are automatically transitioning to a first operating state that enables support for user-level NFS services without requiring the NFS services be active. The SWPAR is automatically booted and access to the SWPAR provided during operation of the NFS services in the first operating state. Once the SWPAR has completed booting, the NFS services is transitioned back to a normal operating state in which SWPAR operates as a standalone device providing its own user-level NFS services. | 02-05-2009 |
20090112965 | PRESERVATION OF FILE LOCKS DURING CHECKPOINT AND RESTART OF A MOBILE SOFTWARE PARTITION - A computer-implemented method, apparatus, and computer-usable program code for preserving file locks while moving a software partition from an origination network file system client data processing system to a destination network file system client data processing system is provided. A request for a file is received. A determination is made as to whether the request is for a file that is within a software partition. Responsive to a determination that the request is for a file within a software partition, a determination is made as to whether the request is a lock request. Responsive to a determination that the request is a lock request, a determination is made as to whether the software partition is being restarted. Responsive to a determination that the software partition is being restarted, the lock request is blocked from being sent to a remote network file system server. | 04-30-2009 |
20090112969 | CHECKPOINT AND RESTART OF NFS VERSION 2/VERSION 3 CLIENTS WITH NETWORK STATE PRESERVATION INSIDE A WORKLOAD PARTITION (WPAR) - Exemplary embodiments provide a computer implemented method, apparatus, and computer-usable program code for moving a software partition from an origination network file system client data processing system to a destination network file system client data processing system. Responsive to receiving a request to perform a checkpoint operation on a software partition, network file system related mount information for the software partition is gathered. Determined ports of a network are unblocked. Unwritten data on the origination network file system client data processing system is synchronized with a remote network file system server. The network is re-blocked. A checkpoint file is generated and stored. The checkpoint file is sent to the destination network file system data processing system. | 04-30-2009 |
20100094948 | WORKLOAD MIGRATION USING ON DEMAND REMOTE PAGING - In one embodiment a method for migrating a workload from one processing resource to a second processing resource of a computing platform is disclosed. The method can include a command to migrate a workload that is processing and the process can be interrupted and some memory processes can be frozen in response to the migration command. An index table can be created that identifies memory locations that determined where the process was when it is interrupted. Table data, pinned page data, and non-private process data can be sent to the second processing resource. Contained in this data can be restart type data. The second resource or target resource can utilize this data to restart the process without the requirement of bulk data transfers providing an efficient migration process. Other embodiments are also disclosed. | 04-15-2010 |
20100095074 | MAPPED OFFSETS PRESET AHEAD OF PROCESS MIGRATION - Disclosed is a computer implemented method and computer program product to prioritize paging-in pages in a remote paging device. An arrival machine receives checkpoint data from a departure machine. The arrival machine restarts at least one process corresponding to the checkpoint data. The arrival machine determines whether a page associated with the process is pinned. The arrival machine associates the page to the remote paging device, responsive to a determination that the page is pinned. The arrival machine touches the page. | 04-15-2010 |
20100095075 | ON-DEMAND PAGING-IN OF PAGES WITH READ-ONLY FILE SYSTEM - Disclosed is a computer implemented method and computer program product to resume a process at an arrival machine that is in an identical state to a frozen process on a departure machine. The arrival machine receives checkpoint data for the process from the departure machine. The arrival machine creates the process. The arrival machine updates a page table, wherein the page table comprises a segment, page number, and offset corresponding to a page of the process available from a remote paging device, wherein the remote paging device is remote from the arrival machine. The arrival machine resumes the process. The arrival machine generates a page fault for the page, responsive to resuming the process. The arrival machine looks up the page in the page table, responsive to the page fault. The arrival machine determines whether the page is absent in the arrival machine. The arrival machine transmits a page-in request to the departure machine, responsive to a determination that the page is absent. The arrival machine receives the page from the departure machine. | 04-15-2010 |
20110093848 | SYSTEM FOR IMPROVING A USER-SPACE ENVIRONMENT - A system to improve a user-space environment may include a user-space configured to execute on an operating system-level virtualization. The system may also include a boot module configured to boot up the user-space on the operating system-level virtualization without disrupting the operating system-level virtualization even if the operating system-level virtualization is already running. | 04-21-2011 |
20110119678 | ISOLATING WORKLOAD PARTITION SPACE - A method, system, and computer usable program product for isolating a workload partition space are provided in the illustrative embodiments. A boot process of a workload partition in a data processing system is started using a scratch file system, the scratch file system being in a global space. A portion of a storage device containing a file system for the workload partition is exported to the workload partition, the portion forming an exported disk. The partially booted up workload partition may discover the exported disk. The exporting causes an association between the global space and the exported disk to either not form, or sever. The exporting places the exported disk in a workload partition space associated with the workload partition. The boot process is transitioned to stop using the scratch file system and start using the data in the exported disk for continuing the boot process. | 05-19-2011 |
20120011519 | PARALLEL CHECKPOINTING FOR MIGRATION OF WORKLOAD PARTITIONS - A method includes receiving a command for migration of a workload partition having multiple processes from a source machine to a target machine. The method includes executing, for each of the multiple processes at least partially in parallel, an operation to create checkpoint data. The operation to create the checkpoint data provides an estimation of a size of the checkpoint data that is needed for migration, wherein the operation to create the checkpoint data is independent of storing the checkpoint data in the file. The method includes allocating areas within the file for storage of the checkpoint data for each of the multiple processes. The method includes storing the checkpoint data, for each of the multiple processes at least partially in parallel, into the areas allocated within the file based on offsets in the file for each of the multiple processes. | 01-12-2012 |
20120047356 | Isolation of Device Namespace to Allow Duplicate/Common Names in Root Volume Group Workload Partitions - A mechanism is provided for isolation of device namespace to allow duplicate or common names in root volume group workload partitions. The mechanism creates a scratch file system that contains enough information to create an execution environment for a workload partition and information about which physical volumes to use for the root volume group file systems. The mechanism then populates the root file systems on a disk in the global space. The mechanism boots the workload partition from the scratch file system and configures the devices to be exported to the workload partition based information in the scratch file system. The mechanism then renames the logical volume names to the traditional names. The mechanism then temporarily mounts the root volume group file system onto the scratch file system. | 02-23-2012 |
20120066555 | MOBILITY OF VERSIONED WORKLOAD PARTITIONS - A versioned workload partition (WPAR) can be migrated from a source machine to a destination machine. Each thread associated with a process executing within the versioned WPAR is frozen. For each thread associated with the process, an error number associated with the thread is received in response to freezing execution of the thread and at least a current state of the thread is determined as checkpoint information associated with the thread based, at least in part, on the error number associated with the thread. The checkpoint information associated with the one or more threads is provided to the destination machine. The checkpoint information is used at the destination machine to reconstruct the process within a destination versioned WPAR on the destination machine. | 03-15-2012 |
20120066556 | ERROR HANDLING IN A VIRTUALIZED OPERATING SYSTEM - When moving workload partitions (WPARs) from machine to machine, operating systems may encounter errors that prevent successful WPAR migration. Recording and reporting errors can be challenging. To move WPARs, the operating system may employ a plurality of software components, such as code residing in user space (e.g., application programs, OS libraries, and shell scripts), code residing in the operating system's kernel, and code residing on remote machines. Embodiments of the invention include a framework that enables all the software components to record errors. The framework can also report the errors to users and processes. | 03-15-2012 |
20120246474 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PRODUCT LICENSE MANAGEMENT - According to one aspect of the present disclosure, a method and technique for product license management for a clustered environment having a plurality of nodes is disclosed. The method includes unlocking a product on a first node of the plurality of clustered nodes; responsive to unlocking the product on the first node, indicating an unlocked status of the product on a shared storage device accessible to the plurality of clustered nodes; and transmitting a self-unlock message from the first node to remaining nodes of the cluster to enable the remaining nodes of the cluster to self-unlock the product on the respective remaining nodes based on the status indication of the shared storage device. | 09-27-2012 |
20130007409 | ON-DEMAND PAGING-IN OF PAGES WITH READ-ONLY FILE SYSTEM - Disclosed is a computer implemented method to resume a process at an arrival machine that is in an identical state to a frozen process on a departure machine. The arrival machine receives checkpoint data for the process from the departure machine. It creates the process. It updates a page table, wherein the page table comprises a segment, page number, and offset corresponding to a page of the process available from a remote paging device, wherein the remote paging device is remote from the arrival machine. It resumes the process and responsively generates a page fault for the page. It looks up the page in the page table, responsive to the page fault. It determines whether the page is absent in the arrival machine. It transmits a page-in request to the departure machine, responsive to a determination that the page is absent. It receives the page from the departure machine. | 01-03-2013 |
20140105212 | COMMUNICATIONS OVER MULTIPLE PROTOCOL INTERFACES IN A COMPUTING ENVIRONMENT - According to one aspect of the present disclosure, a method and technique for communications over multiple protocol interfaces in a computing environment is disclosed. The method includes: identifying a network interface for egress data packet communications; responsive to the identified network interface differing from a data packet fragmentation technique desired for the data packet communications, deriving fragmentation data according to the desired data packet fragmentation technique; generating an application layer header for the data packet communications; storing values of the fragmentation data in select fields of the application layer header; fragmenting the data packet communications according to the desired data packet fragmentation protocol; and transmitting the data packet communications including the application layer header over the identified network interface. | 04-17-2014 |
20140105226 | COMMUNICATIONS OVER MULTIPLE PROTOCOL INTERFACES IN A COMPUTING ENVIRONMENT - According to one aspect of the present disclosure a system and technique for communications over multiple protocol interfaces in a computing environment is disclosed. The system includes a processor and logic executable by the processor to: identify a network interface for egress data packet communications; responsive to the identified network interface differing from a data packet fragmentation technique desired for the data packet communications, derive fragmentation data according to the desired data packet fragmentation technique; generate an application layer header for the data packet communications; store values of the fragmentation data in select fields of the application layer header; fragment the data packet communications according to the desired data packet fragmentation protocol; and transmit the data packet communications including the application layer header over the identified network interface. | 04-17-2014 |
20140129526 | VERIFYING DATA STRUCTURE CONSISTENCY ACROSS COMPUTING ENVIRONMENTS - According to one aspect of the present disclosure a system and technique for verifying data structure consistency across computing environments is disclosed. The system includes: a processor and a compatibility tool. The compatibility tool is executable by the processor to: generate a first signature for a data structure corresponding to a first computing environment; and generate a second signature for the data structure corresponding to a second computing environment. The processor is operable to compare the first and second signatures and, responsive to a disparity between the first and second signatures, indicate a change to the data structure between the first and second computing environments. | 05-08-2014 |
20140129527 | VERIFYING DATA STRUCTURE CONSISTENCY ACROSS COMPUTING ENVIRONMENTS - According to one aspect of the present disclosure, a method and technique for verifying data structure consistency across computing environments is disclosed. The method includes: generating a first signature for a data structure corresponding to a first computing environment; generating a second signature for the data structure corresponding to a second computing environment; comparing the first and second signatures; and responsive to a disparity between the first and second signatures, indicating a change to the data structure between the first and second computing environments. | 05-08-2014 |
20140129696 | RECONSILIATION OF ASYMETRIC TOPOLOGY IN A CLUSTERED ENVIRONMENT - Provided are techniques for the orderly shutdown of a node within a cluster in the event of asymmetric topology maps, comprising receiving, at a first node, a plurality of heartbeats, each heartbeat corresponding to a particular, corresponding other node in the cluster and comprising information on a topological map corresponding to each particular other node's view of the cluster generating, by the first node, a topological map of the cluster based upon the information comprising the heartbeats; comparing the topological map of the cluster and the topological maps corresponding to each node; in response to a determination that the topological maps of the duster and each node are not in agreement, determining the connectivity of the first node with respect to the cluster and in respond to a determination that the first node has the lowest connectivity within the cluster, shutting down the first node. | 05-08-2014 |
20140149977 | Assigning a Virtual Processor Architecture for the Lifetime of a Software Application - A method, system and computer-usable medium are disclosed for managing virtual processor operations. A dynamic loader receives a request to initiate the creation of a new process, followed by a virtual processor being assigned to an isolated execution environment. The dynamic loader then initiates the creation of the new process by mapping kernel data associated with the virtual processor into the address space of the process. The dynamic loader completes the creation of the new process, and its execution is initiated within the isolated execution environment. | 05-29-2014 |
20140156861 | Clustering Support Across Geographical Boundaries - An approach is presented that provides computer clustering support across geographical boundaries. Inter-node communications are managed in a cluster by having each node operate at the network device driver (NDD) level within the kernel. Multiple types of NDD are utilized (Ethernet, SAN, DISK etc.) to provide redundancy so that nodes can reliably exchange heartbeat. To align with this architecture, for remote nodes, a pseudo NDD is used over Transmission Control Protocol (TCP) based communication interface to work along side other NDDs. Thus, the same packet which is sprayed over the NDDs pertaining to local nodes can be sprayed over the TCPSOCK NDD interface for remote nodes. Nodes (local or remote) receive the same packet and reassemble and process it in the same manner. | 06-05-2014 |
20140156862 | Clustering Support Across Geographical Boundaries - An approach is presented that provides computer clustering support across geographical boundaries. Inter-node communications are managed in a cluster by having each node operate at the network device driver (NDD) level within the kernel. Multiple types of NDD are utilized (Ethernet, SAN, DISK etc.) to provide redundancy so that nodes can reliably exchange heartbeat. To align with this architecture, for remote nodes, a pseudo NDD is used over Transmission Control Protocol (TCP) based communication interface to work along side other NDDs. Thus, the same packet which is sprayed over the NDDs pertaining to local nodes can be sprayed over the TCPSOCK NDD interface for remote nodes. Nodes (local or remote) receive the same packet and reassemble and process it in the same manner. | 06-05-2014 |
20140331220 | LIVE APPLICATION MOBILITY FROM ONE OPERATING SYSTEM LEVEL TO AN UPDATED OPERATING SYSTEM LEVEL - Provided are techniques for comparing a first fileset associated with a first operating system (OS) with a second fileset associated with a second OS; determining, based upon the comparing, that the second OS is a more current version of the first OS; in response to the determining that the second OS is a more current version of the first OS, moving, in conjunction with live application mobility, a virtual machine (VM) workload partition (WPAR) on the first LPAR to a second LPAR, the moving comprising determining a set of overlays associated with the WPAR corresponding to the second OS; removing from the WPAR any overlays associated with the first OS; applying to the WPAR a set of overlays corresponding to the second OS; check pointing processes associated with the WAPR; and copying live data associated with the LPAR from the first LPAR to the second LPAR. | 11-06-2014 |
20140331228 | LIVE APPLICATION MOBILITY FROM ONE OPERATING SYSTEM LEVEL TO AN UPDATED OPERATING SYSTEM LEVEL - Provided are techniques for comparing a first fileset associated with a first operating system (OS) with a second fileset associated with a second OS; determining, based upon the comparing, that the second OS is a more current version of the first OS; in response to the determining that the second OS is a more current version of the first OS, moving, in conjunction with live application mobility, a virtual machine (VM) workload partition (WPAR) on the first LPAR to a second LPAR, the moving comprising determining a set of overlays associated with the WPAR corresponding to the second OS; removing from the W PAR any overlays associated with the first OS; applying to the WPAR a set of overlays corresponding to the second OS; check pointing processes associated with the WAPR; and copying live data associated with the LPAR from the first LPAR to the second LPAR. | 11-06-2014 |
20150089059 | Enhanced Mechanisms for Granting Access to Shared Resources - Mechanisms are provided, in a data processing system comprising a plurality of nodes, each node being a computing device, for controlling access to a critical section of code. These mechanisms send, by a sender node of the data processing system, an access request for requesting access to the critical section of code. The critical section of code is a portion of code that accesses a shared resource. The mechanisms receive, in the sender node, from a plurality of receiver nodes in the data processing system, responses to the access request. Each response in the responses includes a number of active nodes perceived by a corresponding receiver node that transmitted the response. The mechanisms control, by the sender node, access to the critical section of code based on the number of active nodes identified in each of the responses received from the receiver nodes. | 03-26-2015 |
20150089060 | Enhanced Mechanisms for Granting Access to Shared Resources - Mechanisms are provided, in a data processing system comprising a plurality of nodes, each node being a computing device, for controlling access to a critical section of code. These mechanisms send, by a sender node of the data processing system, an access request for requesting access to the critical section of code. The critical section of code is a portion of code that accesses a shared resource. The mechanisms receive, in the sender node, from a plurality of receiver nodes in the data processing system, responses to the access request. Each response in the responses includes a number of active nodes perceived by a corresponding receiver node that transmitted the response. The mechanisms control, by the sender node, access to the critical section of code based on the number of active nodes identified in each of the responses received from the receiver nodes. | 03-26-2015 |