-
公开(公告)号:JP2004326764A
公开(公告)日:2004-11-18
申请号:JP2004119557
申请日:2004-04-14
Applicant: Internatl Business Mach Corp
, インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Maschines Corporation Inventor: ANDERSON GARY D , ARNEZ ANDREAS , BOYER JOSHUA W , KREISSIG GERALD G , MOVALL PAUL EDWARD , NELSON WARD R
CPC classification number: G06F11/0793 , G06F11/0715
Abstract: PROBLEM TO BE SOLVED: To provide a recovery process of a built-in processor for monitoring other processes in a system. SOLUTION: In this system, each process can designate a recovery policy that preferably includes recovery count, recovery time and a recovery action. When the process unexpectedly ends, the recovery process determines whether the process has a corresponding recovery policy, checks the recovery count and recovery time designated by the recovery policy to thereby determine whether the process can be recovered when the process has the corresponding recovery policy, executes a recovery action designated by the corresponding recovery policy when the process can be recovered, and resets the system when the process can not be recovered. Thus, the system can recover a single process without giving an influence to other active processes on the system. COPYRIGHT: (C)2005,JPO&NCIPI
-
2.
公开(公告)号:IE20010675A1
公开(公告)日:2002-04-03
申请号:IE20010675
申请日:2001-07-18
Applicant: IBM
Inventor: LAMBETH SHAWN MICHAEL , MEHTA CHETAN , FORSMAN STEPHANIE MARIA , MOVALL PAUL EDWARD
IPC: G06F20060101 , G06F11/10 , G11C11/00 , H02H3/05
Abstract: A method and an apparatus is presented for updating flash memory that contains a write protected code, a first copy of rewritable recovery code, a second copy of rewritable recovery code, and a rewritable composite code. Each block of rewritable code contains a checksum code to detect if the block of code has been corrupted. If it is detected that the first copy of the recovery code is corrupted then the second copy of the recovery code is copied into the first copy of the recovery code. If it is detected the second copy of the recovery code is corrupted then the first copy of the recovery code is copied into the second copy of the recovery code. The recovery code is responsible for checking and updating the composite code. If it is detected the composite code is corrupted then a fresh copy of the composite code is obtained from a removable storage device or a network connection. The data processing system is booted by executing the write protected code, the first copy of the recovery code, and the composite code. There is a minimum of redundant code by only replicating two copies of the recovery code while, at the same time, guaranteeing both the integrity and the updatability of the flash memory.
-