Memory tagging and preservation during a hot upgrade
    6.
    发明授权
    Memory tagging and preservation during a hot upgrade 有权
    在热升级期间内存标记和保存

    公开(公告)号:US08751785B2

    公开(公告)日:2014-06-10

    申请号:US13486856

    申请日:2012-06-01

    IPC分类号: G06F9/24 G06F9/445

    CPC分类号: G06F8/656 G06F9/24 G06F9/4401

    摘要: A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory coupled to the processor, and initiating a boot of a second operating system kernel while preserving in the volatile memory contents stored therein. Following the boot of the second operating system kernel, a set of parameters referencing the tagged region is retrieved from the volatile memory, and the tagged region is then used, based on the retrieved set of parameters.

    摘要翻译: 一种方法包括通过执行第一操作系统内核的处理器标记耦合到处理器的易失性存储器的区域,以及启动第二操作系统内核的引导,同时保留在其中存储的易失性存储器内容中。 在第二操作系统内核的引导之后,从易失性存储器检索引用标记区域的一组参数,然后基于所检索的参数集合来使用标记区域。

    Blocked based end-to-end data protection for extended count key data (ECKD)
    7.
    发明授权
    Blocked based end-to-end data protection for extended count key data (ECKD) 有权
    针对扩展计数密钥数据(ECKD)的基于阻塞的端到端数据保护

    公开(公告)号:US08527724B2

    公开(公告)日:2013-09-03

    申请号:US13219510

    申请日:2011-08-26

    IPC分类号: G06F12/00

    CPC分类号: G06F11/1076

    摘要: Exemplary method, system, and computer program product embodiments for block based end-to-end data protection for extended count key data (ECKD) in a computing environment are provided. In one embodiment, by way of example only, information units (IU's) are aligned in a block boundary format. Block protection trailer data is added to each one of the IU's. Additional system and computer program product embodiments are disclosed and provide related advantages.

    摘要翻译: 提供了用于在计算环境中用于扩展计数密钥数据(ECKD)的基于块的端到端数据保护的示例性方法,系统和计算机程序产品实施例。 在一个实施例中,仅作为示例,信息单元(IU)以块边界格式对准。 块保护拖车数据被添加到IU的每一个。 公开了附加的系统和计算机程序产品实施例并提供相关的优点。

    BLOCKED BASED END-TO-END DATA PROTECTION FOR EXTENDED COUNT KEY DATA (ECKD)
    8.
    发明申请
    BLOCKED BASED END-TO-END DATA PROTECTION FOR EXTENDED COUNT KEY DATA (ECKD) 有权
    扩展数据密钥数据(ECKD)的基于阻塞的端到端数据保护

    公开(公告)号:US20130054916A1

    公开(公告)日:2013-02-28

    申请号:US13219510

    申请日:2011-08-26

    IPC分类号: G06F12/00

    CPC分类号: G06F11/1076

    摘要: Exemplary method, system, and computer program product embodiments for block based end-to-end data protection for extended count key data (ECKD) in a computing environment are provided. In one embodiment, by way of example only, information units (IU's) are aligned in a block boundary format. Block protection trailer data is added to each one of the IU's. Additional system and computer program product embodiments are disclosed and provide related advantages.

    摘要翻译: 提供了用于在计算环境中用于扩展计数密钥数据(ECKD)的基于块的端到端数据保护的示例性方法,系统和计算机程序产品实施例。 在一个实施例中,仅作为示例,信息单元(IU)以块边界格式对齐。 块保护拖车数据被添加到IU的每一个。 公开了附加的系统和计算机程序产品实施例并提供相关的优点。

    MEMORY TAGGING AND PRESERVATION DURING A HOT UPGRADE
    9.
    发明申请
    MEMORY TAGGING AND PRESERVATION DURING A HOT UPGRADE 有权
    在热升级期间的记忆标​​记和保存

    公开(公告)号:US20120246456A1

    公开(公告)日:2012-09-27

    申请号:US13486856

    申请日:2012-06-01

    IPC分类号: G06F9/24

    CPC分类号: G06F8/656 G06F9/24 G06F9/4401

    摘要: A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory coupled to the processor, and initiating a boot of a second operating system kernel while preserving in the volatile memory contents stored therein. Following the boot of the second operating system kernel, a set of parameters referencing the tagged region is retrieved from the volatile memory, and the tagged region is then used, based on the retrieved set of parameters.

    摘要翻译: 一种方法包括通过执行第一操作系统内核的处理器标记耦合到处理器的易失性存储器的区域,以及启动第二操作系统内核的引导,同时保留在其中存储的易失性存储器内容中。 在第二操作系统内核的引导之后,从易失性存储器检索引用标记区域的一组参数,然后基于所检索的参数集合来使用标记区域。

    MEMORY TAGGING AND PRESERVATION DURING A HOT UPGRADE

    公开(公告)号:US20120096251A1

    公开(公告)日:2012-04-19

    申请号:US12903826

    申请日:2010-10-13

    IPC分类号: G06F9/24

    CPC分类号: G06F8/656 G06F9/24 G06F9/4401

    摘要: A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory coupled to the processor, and initiating a boot of a second operating system kernel while preserving in the volatile memory contents stored therein. Following the boot of the second operating system kernel, a set of parameters referencing the tagged region is retrieved from the volatile memory, and the tagged region is then used, based on the retrieved set of parameters.