摘要:
A method for managing data in a computer system comprises identifying a data-set that has data unit protection that is suspected of having been corrupted, suspending a data unit protection process for the data-set; deferring re-establishing the data unit protection process for the data-set until issuance of a request for an I/O operation for the data unit; and re-establishing the data unit protection process for the data-set in response to the request and before the I/O operation is conducted. The data has a data unit protection invalidity indicator for indicating that the data-set has data unit protection that is suspected of having been corrupted; and the data unit protection process is suspended in the presence of the data-set protection invalidity indicator. Meta-data protection that is suspected of having been corrupted may be used to identify a corrupted data-set.
摘要:
A method for managing data in a computer system comprises identifying a data-set that has data unit protection that is suspected of having been corrupted, suspending a data unit protection process for the data-set; deferring re-establishing the data unit protection process for the data-set until issuance of a request for an I/O operation for the data unit; and re-establishing the data unit protection process for the data-set in response to the request and before the I/O operation is conducted. The data has a data unit protection invalidity indicator for indicating that the data-set has data unit protection that is suspected of having been corrupted; and the data unit protection process is suspended in the presence of the data-set protection invalidity indicator. Meta-data protection that is suspected of having been corrupted may be used to identify a corrupted data-set.
摘要:
Described are techniques for representing and using RAID group consistency information. RAID group consistency information for a slice of data included on a device may be obtained by mapping the slice to an index. The index is one of a plurality of indices each associated with a structure indicating RAID group inconsistencies for a different portion of slices of data of the device. If the index is not associated with a structure, it may be determined that there is no RAID group inconsistency for the slice. If the index is associated with a structure, a hint bit associated with the slice may be determined wherein the hint bit encodes summary consistency information for a plurality of slices. A determination is made as to whether the hint bit is set, and, if the hint bit is not set, it is determined that there is no RAID group inconsistency for the slice.
摘要:
A method for recovering meta-data that has been subjected to corruption is disclosed for a cache memory. Each table entry in the cache memory has an in-cache indicator for indicating whether the data unit associated therewith is stored in a cache-slot in the cache memory. A first review is conducted of the table entries for identifying in-cache table entries (those that are associated with cache-slots in the cache memory), performing a correction attempt to ensure that the meta-data in an in-cache table entry are validated and corrected, if necessary, and ensuring that the in-cache indicator is set for an in-cache table entry. A second review is conducted of the table entries to ensure that the in-cache indicator is not set for any table entry that is not an in-cache table entry or for any in-cache table entry for which the correction attempt was unsuccessful.
摘要:
Embodiments of the invention exploit the fact that not all portions of a logical volume may include data written by a host. Accordingly, an embodiment of the invention includes setting a designated set of bits to 1 in a meta data table when a logical volume is initialized. These bits may be referred to herein as Never Written by Host (NWBH) bits. Separately, or in combination, an embodiment of the invention includes setting a NWBH bit to 0 when data is written to the associated portion of the logical volume. Separately, or in combination, an embodiment of the invention includes reading the NWBH bit upon receiving a read command associated with the associated portion of the logical volume. If the NWBH bit is equal to 1, data is not read from the associated portion of the logical volume; if the NWBH bit is equal to 0, data is read from the associated portion of the logical volume.
摘要:
A method for recovering meta-data that has been subjected to corruption is disclosed for a cache memory. Each table entry in the cache memory has an in-cache indicator for indicating whether the data unit associated therewith is stored in a cache-slot in the cache memory. A first review is conducted of the table entries for identifying in-cache table entries (those that are associated with cache-slots in the cache memory), performing a correction attempt to ensure that the meta-data in an in-cache table entry are validated and corrected, if necessary, and ensuring that the in-cache indicator is set for an in-cache table entry. A second review is conducted of the table entries to ensure that the in-cache indicator is not set for any table entry that is not an in-cache table entry or for any in-cache table entry for which the correction attempt was unsuccessful.