Checkpointing using FPGA
First Claim
Patent Images
1. A computer-implemented method for checkpointing using a field programmable gate array (FPGA) comprising:
- temporarily locking a first region of data of a server to prevent access to the data in the first region while allowing access to data in other regions of the server;
checkpointing the data in the first region of the server to memory while the first region is locked;
subsequent to checkpointing the data in the first region, releasing the locking of the first region; and
monitoring the checkpointed data of the first region using the FPGA, wherein the FPGA is coherently coupled to the memory such that the monitoring is performed automatically with the FPGA capturing accesses within the first region and the FPGA invalidates cache lines associated with the data in the first region of the server when it is checkpointing.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer-readable and executable instructions are provided for checkpointing using a field programmable gate array (FPGA). Checkpointing using FPGA can include checkpointing data within a region of a server'"'"'s contents to memory and monitoring the checkpointed data using the FPGA.
9 Citations
15 Claims
-
1. A computer-implemented method for checkpointing using a field programmable gate array (FPGA) comprising:
-
temporarily locking a first region of data of a server to prevent access to the data in the first region while allowing access to data in other regions of the server; checkpointing the data in the first region of the server to memory while the first region is locked; subsequent to checkpointing the data in the first region, releasing the locking of the first region; and monitoring the checkpointed data of the first region using the FPGA, wherein the FPGA is coherently coupled to the memory such that the monitoring is performed automatically with the FPGA capturing accesses within the first region and the FPGA invalidates cache lines associated with the data in the first region of the server when it is checkpointing. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable medium storing a set of instructions executable by a processing resource to:
-
temporarily lock a first region of data in a memcached server using a field-programmable gate array (FPGA) to prevent access to the data in the first region while allowing access to other regions of data in the memcached server; checkpoint the first region of data of the memcached server to non-volatile memory while the first region of the memcached server is locked; release the lock for a period of time; lock a second region of data of the memcached server; checkpoint the second region of data of the memcached server to the non-volatile memory while the second region of the memcached server is locked; and monitor the checkpointed data within the first and second regions using the FPGA, wherein the FPGA is coherently attached to the non-volatile memory such that the monitoring is performed automatically with the FPGA capturing accesses within the first and second regions and the FPGA invalidates cache lines associated with the first and second regions of data when they are checkpointing. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A system for checkpointing using a field-programmable gate array (FPGA), comprising:
-
a memory resource; and a processing resource coupled to the memory resource, to; receive a number of address regions within a memcached server to checkpoint; temporarily lock a first address region to prevent access data in the first address region while allowing access data in other address regions of the memcached server; checkpoint the first address region to non-volatile memory while the first address region is locked; and monitor the data in the first address region using the FPGA, wherein the FPGA is coherently coupled to the non-volatile memory such that the monitoring is performed automatically with the FPGA capturing accesses within the first address region and the FPGA invalidates cache lines associated with the first address region when it is checkpointing. - View Dependent Claims (13, 14, 15)
-
Specification