摘要:
A method for processing a request from a host to write a database record to a target location on a logical device associated with a data-storage system in data communication with the host includes maintaining, at the data storage system, information identifying extents of the logical device that are designated for storage of database records, and, on the basis of the information, determining whether the target location is one on which a database record is permitted to be stored.
摘要:
A method for processing a write instruction for writing data to a database stored on a logical device includes obtaining first and second addresses that specify the location of the data in respective first and second address spaces. A third address corresponding to an expected location of the data record in the first address space is then calculated. On the basis of a comparison between the first address and the third address, a determination is made as to whether to execute the write instruction.
摘要:
Described are techniques for processing data requests in connection with an I/O operation. A write data request is sent from a host to a target data storage system. The host performs a data validation, such as a checksum calculation, using the data of the data request. The data request is sent to the target data storage system. The target data storage system may be enabled to perform data validation processing on a per device basis by setting one or more device flag bits for a device. The target data storage system performs data validation processing in accordance with the flag bit settings of a device associated with a data request. A target checksum value using the data received on the target data storage system is determined and compared to the host checksum value in order to determined data validity. Data recovery processing is performed if data corruption is determined. A partial write of the data requested may be performed for those data portions occurring prior to the corrupted data that have been successfully validated.
摘要:
A system and method for initializing large portions, or extents, of a mass-storage device in the background so that such overwriting processes do not significantly affect latency as experienced by a host. The method extends the use a system intended for background copying of data from a source extent to a destination extent to that of initializing an extent on a mass-storage device. It does so by causing the system to treat the defined extent as both a source extent and as a destination extent simultaneously.
摘要:
A method and apparatus for indenting changes to a logical object on a host computer by examining information relating to a physical level in a data storage system wherein the logical object is stored. In one embodiment, a method for determining changes to a logical object subsequent to a reference time is described for a logical object that belongs to an application layer of a host computer in a computer system. The computer system includes the host computer, a storage system, and at least one mapping layer that maps the logical object to a physical layer relating to physical storage locations on the storage system. The physical layer includes physical change information relating to changes made to the physical storage locations on the storage system subsequent to the reference time. The method includes steps of mapping the logical object from the application layer to the physical layer to identify which physical storage locations include data corresponding to the logical object, examining the physical change information to identify any of the physical storage locations identified in the step of mapping that include data that has changed subsequent to the reference time, and determining that changes have been made to the logical object when any physical storage locations are identified in the step of examining as including data that has changed subsequent to the reference time.
摘要:
A method and apparatus for obtaining an identifier of a logical unit of data that belongs to a database. In one embodiment, a method of obtaining a first identifier of a logical unit of data that belongs to a database is described. The first identifier uniquely identifies a location of the logical unit of data within the database, and the method includes determining a group of identifiers that includes the first identifier based upon information, concerning a structure of the database, that does not directly specify the group of identifiers. In one aspect of the present invention wherein the logical unit of data has an application space label which can be used by application programs to access the logical unit of data from the database, the method obtains the first identifier without first accessing the logical unit of data from the database using the application space label.
摘要:
A method and apparatus for obtaining an identifier of a logical unit of data that belongs to a database. In one embodiment, a method of obtaining a first identifier of a logical unit of data that belongs to a database is described. The first identifier uniquely identifies a location of the logical unit of data within the database, and the method includes determining a group of identifiers that includes the first identifier based upon information, concerning a structure of the database, that does not directly specify the group of identifiers. In one aspect of the present invention wherein the logical unit of data has an application space label which can be used by application programs to access the logical unit of data from the database, the method obtains the first identifier without first accessing the logical unit of data from the database using the application space label.
摘要:
Described are techniques for determining one or more logical data objects for a storage location. The storage location indicating a location on a device of a data storage system is provided. A list of one or more logical data objects is received. For each of the one or more logical data objects, one or more related data storage system locations associated with each logical data object are determined. It is determined whether the storage location is included in any of the one or more logical data objects. It is also identified whether, for each of the one or more logical data objects, the storage location is one of the one or more related data storage system locations associated with each logical data object.
摘要:
A method and apparatus for assuring data consistency during certain operations involving dependent input/output sequences. During such operations a stall application blocks write operations to specified logical devices in a local consistency group while allowing read operations to all devices and write operations to non-specified logical devices. When a write command is directed to a logical device in local consistency group, the host adapter associated with the logical device returns a message to the host that initiates a write command retry. Retries generally continue until a write command is successful.
摘要:
Described are techniques in connection with restricting access to devices within a computer system. Access to a device may be restricted to one or more particular hosts within the computer system, and also further restricted to a particular software program executing within the particular hosts. The restricted access device (RAD) may be recognized by one or more hosts only having access to specific portions of the RAD unless special RAD I/O opcodes are used in connection with performing I/O operations. Access to a device may be obtained by enabling a particular use of the special RAD I/O opcodes. Subsequently, access to the same device may be disabled by stopping use of the special RAD I/O opcodes by a particular host and/or software executing in the host. RADs may be used in a variety of applications including, for example, restricting access to shared logs or journals and protecting a database.
摘要翻译:描述了与限制对计算机系统内的设备的访问有关的技术。 对设备的访问可以限于计算机系统内的一个或多个特定主机,并且还进一步限于在特定主机内执行的特定软件程序。 受限访问设备(RAD)可以被一个或多个仅能访问RAD的特定部分的主机识别,除非在执行I / O操作时使用特殊的RAD I / O操作码。 可以通过使用特殊的RAD I / O操作码来获得对设备的访问。 随后,可以通过由主机中执行的特定主机和/或软件停止使用特殊的RAD I / O操作码来禁用对同一设备的访问。 RAD可以用于各种应用,包括例如限制对共享日志或日志的访问和保护数据库。