摘要:
A method for managing data in a computer system comprises identifying a data-set that has data unit protection that is suspected of having been corrupted, suspending a data unit protection process for the data-set; deferring re-establishing the data unit protection process for the data-set until issuance of a request for an I/O operation for the data unit; and re-establishing the data unit protection process for the data-set in response to the request and before the I/O operation is conducted. The data has a data unit protection invalidity indicator for indicating that the data-set has data unit protection that is suspected of having been corrupted; and the data unit protection process is suspended in the presence of the data-set protection invalidity indicator. Meta-data protection that is suspected of having been corrupted may be used to identify a corrupted data-set.
摘要:
A method and apparatus for data recovery in a system involving a first data store acting as a standard device and a physical moving mirror data store that operates as moving mirror with a first mode to be synchronized and in a second, isolated mode. In response to a command to establish a third or protected restore operating mode, the data to be transferred in response to that command is identified. A restoration procedure copies data from the second data store to the first store to recover any data that may have been corrupted in the second data store. An update procedure acts on the restored data concurrently with the restoration procedure.
摘要:
Method and apparatus are disclosed for identifying and repairing data coherence problems in a storage system including redundant information. The verification and repair process may be initiated during on-line processing. The verification and repair process may proceed during on-line operation.
摘要:
A method for copying a data file from a source device to a destination device. In response to a copy command from a requesting host application identifying the source file and the storage locations in a destination, an extents track is formed to establish an environment in which the file will be copied. The calling system receives an immediate response that the copy operation is complete even though no data has been copied. Application programs may access the file in either the source or the destination. A copy program transfers the file on a track-by-track basis to the destination storage locations. Procedures assure that any data access to a particular track in either the source or destination by any application prior to the transfer of that track are accommodated to maintain data integrity.
摘要:
Method and apparatus are disclosed for resolving data coherence problems (or mismatched data caused by a failure to update data) in a storage system that includes redundant information. The data may be stored as CKD records or fixed size blocks. The method and apparatus may identify data coherence problems by comparing fields for which the correct value is known in advance, by comparing fields between more than one copy of corresponding data units and through other disclosed techniques.
摘要:
Method and apparatus are disclosed for resolving data coherence problems (or mismatched data caused by a failure to update data) in a storage system that includes redundant information. The data may be stored as CKD records or fixed size blocks. The method and apparatus may identify data coherence problems by comparing fields for which the correct value is known in advance, by comparing fields between more than one copy of corresponding data units and through other disclosed techniques.
摘要:
Method and apparatus are disclosed for identifying and repairing data coherence problems in a storage system including redundant information. The verification and repair process may be initiated during on-line processing. The verification and repair process may proceed during on-line operation.
摘要:
A method for copying a data file from a source device to a destination device. In response to a copy command from a requesting host application identifying the source file and the storage locations in a destination, an extents track is formed to establish an environment in which the file will be copied. The calling system receives an immediate response that the copy operation is complete even though no data has been copied. Application programs may access the file in either the source or the destination. A copy program transfers the file on a track-by-track basis to the destination storage locations. Procedures assure that any data access to a particular track in either the source or destination by any application prior to the transfer of that track are accommodated to maintain data integrity.
摘要:
In one embodiment of the invention, during a single I/O operation, data is destaged from a cache to at least two non-contiguous storage locations of a data storage device without overwriting at least one storage location disposed between the at least two non-contiguous storage locations. In another embodiment, a communication link is established between a controller that controls data flow between a cache and a data storage device, and this communication link is used to destage data from the cache to at least two non-contiguous storage locations of the data storage device without overwriting at least one storage location between the at least two non-contiguous storage locations and without breaking the communication link. In another embodiment of the invention, data is destaged from a cache to a data storage device by transmitting the data to the data storage device, and also transmitting information to the data storage device identifying at least two storage locations to which the data is to be written, and further identifying at least one storage location, disposed between the at least two storage locations, to which the data is not to be written.
摘要:
A method and apparatus for enabling an on-line reconfiguration of striped data in a disk array storage device. A replicated copy of the striped logical device is made in parallel with host operations. A logical device with a new configuration is then substituted for access by the host application even before any data is transferred to locations within the newly configured logical device. Independent processes operating in this disk array storage device reconfigure the data transparently to any host operations while accommodating host I/O requests directed to locations in the new configuration.