Abstract: A method, system and computer accessible medium for expiring access tokens in preparation for freezing file images. A metadata server may maintain a next scheduled quiesce time and may issue access tokens configured to expire before the next scheduled quiesce time. A metadata server may set an access token's expiration time to a maximum expiration time indicated by the next scheduled quiesce time or may set an access token's expiration time to a default expiration time if the default expiration time is earlier than the maximum expiration time. A storage device may recognize and enforce the access token's expiration time.
Abstract: Systems and methods for I/O fencing in a shared storage environment are provided. Prior to initiating an I/O request, when feasible, the current time from a local timer is compared to the current state of an interval obtained for the target device. As a result, a device reset occurring while the interval is viable does not arbitrarily end a multiphase I/O operation. However, a device reset occurring once the lease has expired results in a delay or termination of the multiphase I/O operation. As a result, multiphase I/O operations from initiating hosts that have lost contact with the shared storage environment are not allowed to corrupt the shared storage devices.
Type:
Grant
Filed:
August 6, 2007
Date of Patent:
May 18, 2010
Assignee:
Symantec Operating Corporation
Inventors:
Ronald S. Karr, John A. Colgrove, Oleg Kiseley
Abstract: A method, device and system for storing data in a cache in case of power failure are disclosed. The method includes: in case of power failure of a storage system, receiving configuration information from a central processing unit (CPU); establishing a mapping relationship between an address of data in the cache and an address in a storage device according to the configuration information; sending a signaling message that carries the mapping relationship to the cache, so that the cache migrates the data to the storage device according to the signaling message.
Abstract: Systems and methods for performing sparse backups are disclosed. One method may involve: receiving information indicating unallocated extents from a file system that organizes data on a primary storage device; copying to a backup storage device data from extents of the primary storage device, where the unallocated extents indicated by the information are not copied; and for each of a plurality of copied extents, storing a mapping from an original extent on the primary storage device to a new extent on the backup storage device into which data stored in that original extent is copied. A backup volume that includes the data included in plurality of copied extents may be mounted, and the mapping may be used to translate accesses to the extents on the backup volume to extents on the backup storage device.
Abstract: A method includes logging past event sequences in a knowledge base, receiving a real-time event sequence, comparing the real-time event sequence to the past event sequences to determine a predicted event sequence for the real-time event sequence, and providing the predicted event sequence, a suggested course of action with predicted outcome, and a recommendation of a user who previously encountered the event sequence. In the above manner, use of subjectively characterized and/or raw historic data to match real-time event sequences provides users with both subjective advice from those who had previously faced similar conditions as well as raw statistical predictions as to what is expected to come next. This allows the users to take a course of action that results in the most desirable outcome.
Abstract: Methods, systems, and apparatus can provide individual users of a computer system a means to share their quotas to resources accessible through that system. In one embodiment, this is accomplished, in part, by providing a shared quota descriptor understood by a file system and that can be manipulated by individual users. To that end, the present invention further provides individual users access to mechanisms by which to create and adjust shared quotas.
Abstract: An apparatus or method for preserving the relationships or dependencies between content of files in a file system or between content of files in separate file systems. The preservation of relationships or dependencies may require the preservation of the files and their content as well. In one embodiment, the method includes receiving a first instruction that, when implemented, performs an operation involving a first file in a file system, wherein the first file is related to the second file. In response to receiving the first instruction, a second instruction is selected that, when implemented, performs a second operation involving the first file or a second file, wherein the second instruction is implemented before or after implementing the first instruction.
Type:
Grant
Filed:
May 2, 2006
Date of Patent:
May 11, 2010
Assignee:
Symantec Operating Corporation
Inventors:
Ankur P. Panchbudhe, Veeral P. Shah, Amol S. Katkar
Abstract: A method of administering a mobile client device is provided. In an example, notice is received of a device being physically present at a location of interest, an executable work flow or script for implementing a corresponding change to the device is prepared in response to the physical presence notice, and the executable work flow or script is transmitted to the device upon an occurrence of the device initiating a communication with a network so as to enable an agent resident on the device to implement the corresponding change. In an example, a device detector remotely receives a response signal from a vicinity of the device, the response signal being generated and transmitted in response to a corresponding interrogation signal. In an example, the interrogation signal is an RFID interrogation signal.
Abstract: The disclosure is directed to an application server including memory including an instrumented computer executable application. The instrumented computer executable application includes a first routine including a first set of tracing instructions and external resource access instructions and the instrumented computer executable application includes a second routine. The second routine includes a first segment including a second set of tracing instructions and instructions configured to access the first routine and the second routine includes a second segment including the external resource access instructions.
Type:
Grant
Filed:
March 29, 2005
Date of Patent:
May 11, 2010
Assignee:
Symantec Corporation
Inventors:
Steven Smith, Eric David Schank, Brian Mead Tyler
Abstract: Various embodiments of a system and method for processing a request in a distributed software application are disclosed. In response to a client request, one or more server computers may modify a plurality of different portions of state information. The system may operate to ensure that the portions of state information are all modified atomically. The system may also operate to provide transparent connection failover functionality for the network connection between the client computer and the one or more server computers.
Abstract: A cluster comprises a plurality of computer systems, wherein each of the plurality of computer systems is configured to execute one or more virtual machines. Each of the plurality of computer systems comprises hardware and a plurality of instructions. The plurality of instructions, when executed on the hardware, migrates at least a first virtual machine executing on a first computer system of the plurality of computer systems to a second computer system of the plurality of computer systems. The plurality of instructions migrates the first virtual machine responsive to a first load of the first computer system prior to the migration exceeding a second load of the second computer system prior to the migration.
Type:
Grant
Filed:
February 13, 2007
Date of Patent:
May 11, 2010
Assignee:
Symantec Operating Corporation
Inventors:
Hans F. van Rietschote, Craig W. Hobbs, Mahesh P. Saptarshi
Abstract: A method and apparatus for providing flexible access to storage resources in a storage area network is provided. One aspect of the invention relates to managing hosts and storage resources on a storage area network. At least one logical relationship among the storage resources is associated with each of a plurality of virtual identifiers. At least one of the plurality of virtual identifiers is then associated to an interface of each of the hosts.
Abstract: Network fabric events may be utilized to proactively handle network path outages. A storage network virtualization manager may receive a network fabric event indicating a failure along a network path to a storage device and in response may initiate a proactive error handling mechanism. A storage network virtualization manager may proactively handle a network path failure before I/O requests via that network path fail. The proactive error handling mechanism may be initiated and completed prior to or without a host receiving an indication that an access request to a storage device on the network path has failed. Proactive error handling in response to network fabric events may reduce the number of I/O failures and retries and may also reduce the length of time access requests to storage devices affected by a network fabric path failure must be quiesced.
Abstract: A method, computer program product and system that enables dynamic determination of device attributes and dynamic configuration of device drivers for storage devices in a heterogeneous storage environment. Attributes of a device are dynamically determined by an application program, and those attributes are used by the application program to configure the device driver. The application program and the storage device being configured remain operational during the reconfiguration process.
Abstract: Systems and methods for computer security are provided. In one implementation, a computer-implemented method is provided. The method includes applying a hook to a kernel of an operating system, monitoring system calls made to the kernel using the hook, and injecting a new entry into a list of files assembled by a loader to create a new process when the hook identifies a create process system call. In another implementation, the method can further include initializing the injected new entry where the injected new entry is operable to examine process files prior to loading, examining the process files, and acting on the process according to a result of the examination.
Abstract: An interactive system for debugging programs in which a persistent data base system responds to update queries containing debugging information from a debugging information source and to read queries on the debugging information from an interactive interface. The interactive interface produces the read queries in response to inputs from users and formats the results of the read queries as required by the user. One source of inputs is a standard Web browser for which the interactive interface functions as a Web server. The system also includes a command channel by which the source of debugging information receives commands from the interactive interface. In one embodiment, the command channel is implemented in the data base. In a disclosed implementation, the source of debugging information provides memory debugging information. Also disclosed are techniques for using an automatic memory management system to reduce memory fragmentation and heap footprint size.
Type:
Grant
Filed:
March 28, 2005
Date of Patent:
April 27, 2010
Assignee:
Symantec Operating Corporation
Inventors:
Michael P. Spertus, Charles Fiterman, Gustavo Rodriguez Rivera
Abstract: One method of updating a change track map involves resetting a mirror recovery map for a data volume. Just before the mirror recovery map is reset, a change track map for the data volume can be updated, using the mirror recovery map. The mirror recovery map can be reset by a data element of a data processing system, while the change track map can be updated by a control element of the data processing system.
Type:
Grant
Filed:
June 30, 2004
Date of Patent:
April 27, 2010
Assignee:
Symantec Operating Corporation
Inventors:
Mukul Kumar, Ronald S. Karr, Subhojit Roy, Prasad Limaye, Raghu Krishnamurthy, Anand A. Kekre
Abstract: A system and method for low impact backup. In one embodiment, a method may comprise monitoring utilization of a system resource and a data management process selectively performing I/O operations dependent upon the monitored utilization of the system resource. The data management process may include functionality to backup desired data from a storage medium to a backup medium. In one particular implementation, the I/O operations may be allowed to be performed in response to the utilization of the system resource falling below a predetermined threshold. In another embodiment a method may comprise performing a plurality of I/O operations to complete a data management process executed by an application. The application separates said plurality of I/O operations with intermittent delays to achieve time-slicing of the data management process with respect to one or more other applications.
Abstract: Disclosed is a method and apparatus for supporting direct write access from many nodes of a multi-mode network to a file managed by a single node file system. The network includes first and second nodes coupled to each other via a first communication link, and a peripheral data storage device coupled to the first and second nodes via a second communication link. In one embodiment, the method includes the first node receiving data. The first node transmits a first message to the second node via the first communication link in response to the first node receiving the data. A software module such as a single node file system, executing on the second node, allocates storage memory of the peripheral data storage device for the data received by the first node in response to the second node receiving the first message.
Abstract: In one embodiment, a virtual NUMA system may be formed from multiple computer systems coupled to a network such as InfiniBand, Ethernet, etc. Each computer includes one or more software modules which present the resources of the computers as a virtual NUMA machine. The virtual machine is a non-uniform memory access (NUMA) machine comprising a plurality of nodes, each node having memory that is part of a distributed shared memory. Additionally, the virtual machine is coherent with a weakly ordered memory model. When executed in a current owner node of a first block in response to an ownership transfer request from a requesting node of the plurality of nodes for the first block, the software modules perform a synchronization operation if the first block has been modified in the current owner node.