Double-controller-based read-write locking method and device

A dual-controller, controller technology, applied in the direction of memory address/allocation/relocation, input/output to record carrier, etc., can solve problems such as inability to adjust flexibly, and achieve the effect of accurately handling lock conflicts and reducing communication

Active Publication Date: 2016-07-27
武汉神州数码云科网络技术有限公司 +1
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The block size is fixed and cannot be flexibly adjusted with different RAID levels;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-controller-based read-write locking method and device
  • Double-controller-based read-write locking method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0069] The present invention is described below with a specific embodiment, but does not limit the protection scope of the present invention. The method of this embodiment includes:

[0070] (1) Divide the entire storage address space into M intervals. The interval size can be specified when the lock is created. For example, it can be specified as the size of a strip (this is an optimization parameter). The interval is the smallest unit of ownership division. (2) Divide the entire storage address space into several equal-length interval blocks, for example, divide the 128TB storage address space into 1024 interval blocks according to 128GB, the purpose is to narrow the range of the interval block and speed up the search on the interval block Speed, this step can be seen as a simple Hash. The size of an interval block is an integer multiple of the interval size (except for the last interval block).

[0071] (3). The root node of a red-black tree is stored on each interval bl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a double-controller-based read-write locking method and device, and relates to the technical field of disk data read-write. The method comprises the following steps: determining an interval block, to which a target read-write interval belongs; searching an Area node, to which the interval block belongs, on a read-black tree of the determined interval block; searching the target read-write interval on a red-black tree of the searched Area node; if the target read-write interval is not searched, creating a Block node corresponding to the target read-write interval and inserting the created Block node into the red-black tree of the Area node; creating a SubLlock node under the Block node; searching nodes, the memory address spaces of which have conflict, in the SubLock node; adding conflict count of the SubLock node if the nodes, the memory address spaces of which have conflict, have read-write conflict; judging whether the conflict count is an initial value; if the conflict count is an initial value, completing the locking of the target read-write interval. Through the coordination of the steps, the communication can be decreased and the locking conflict can be processed more accurately.

Description

technical field [0001] The invention relates to the technical field of disk data reading and writing, in particular to a method and device for reading and writing locks based on dual controllers. Background technique [0002] In a dual-controller storage server, several disks can be made into a disk array (RedundantArraysofindependentDisks, RAID) volume group, thereby providing high-speed and secure data storage services. Most RAID levels (such as RAID5) require disks to be managed in stripes, and read and write access to a stripe must be mutually exclusive, otherwise data errors will occur. For example, the open source RAID that comes with Linux uses local stripe locks, but it cannot meet the mutual exclusion requirements of dual controllers for RAID stripes. And at the data cache level, there must also be a corresponding dual-control lock to control the mutual exclusion of reading and modifying the dual-control cache (Cache). [0003] To sum up, what is needed in actual ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/06G06F12/02
Inventor 李浩然
Owner 武汉神州数码云科网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products