Disk lock management method and device

A management method and management device technology, applied in the field of disk lock management methods and devices, can solve problems such as data inconsistency, server downtime, file system read-only, etc., and achieve the effect of avoiding read-only or server downtime

Active Publication Date: 2019-05-14
NEW H3C CLOUD TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the object of the present invention is to provide a disk lock management method and device to avoid problems such as data inconsistency, file system read-only or server downtime caused by processing expired messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Disk lock management method and device
  • Disk lock management method and device
  • Disk lock management method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0045] The embodiment of the present invention provides a disk lock management method, which is applied to the first node of the shared file system 100, and the first node communicates with the second node of the shared file system 100 to avoid data lock caused by processing expired messages. Inconsistencies, read-only file systems, or server downtime.

[0046] It should be noted that the second node in this embodiment is the node 110 that initiates an access request to a certain resource 122 of the shared file system 100, and the first node is the node 110 that holds the disk lock 1222 corresponding to the resource 122 .

[0047] It should also be noted that, in other embodiments, the second node may be the node 110 holding the disk lock 1222 corresponding to the resource 122, and the first node may be a resource 122 that initiates an access request to the shared file system 100 Each node 110 can be a node 110 that initiates an access request to a certain resource 122 of the...

no. 2 example

[0069] The embodiment of the present invention provides a disk lock management method, which is applied to the second node of the shared file system 100, and the second node communicates with at least one first node of the shared file system 100, so as to avoid data inconsistency, file system read-only, or server downtime.

[0070] It should be noted that the second node in this embodiment is the node 110 that initiates an access request to a certain resource 122 of the shared file system 100, and at least one first node is mounted on the same shared file system as the second node The nodes 110 of 100 are the nodes 110 belonging to the same cluster. In addition, there may be a node 110 holding the target disk lock corresponding to the resource 122 in at least one first node, or there may not be a node 110 holding the target disk lock corresponding to the resource 122 .

[0071] see Figure 6 , is a flow chart of the disk lock management method provided by the embodiment of t...

no. 3 example

[0094] The embodiment of the present invention provides a disk lock management device 200. It should be noted that the basic principles and technical effects of the disk lock management device 200 provided in this embodiment are the same as those of the first embodiment. For a brief description, For parts not mentioned in this embodiment, reference may be made to the corresponding content in the first embodiment. see Figure 7 , is a functional block diagram of the disk lock management device 200 provided by the embodiment of the present invention, the disk lock management device 200 includes: an information receiving unit 210, an analysis unit 220, a reading unit 230, a judging unit 240, and a disk lock management unit 250.

[0095] The information receiving unit 210 is configured to receive an unlock request transmitted by the second node based on the logical block address of the target disk lock and the first identifier of the resource 122 corresponding to the target disk l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a disk lock management method and device, and relates to the technical field of data processing. According to the method and the device, a received unlocking request is analyzed to obtain a logic block address and a first identity identifier; and when the actual disk lock corresponding to the logic block address is found, reading a second identity identifier of the resource corresponding to the actual disk lock, and when the first identity identifier is consistent with the second identity identifier, performing unlocking operation on the target disk lock to enable the second node to perform locking operation on the target disk lock. Through judging whether a first identity identifier of a resource corresponding to a target disk lock is consistent with a second identity identifier of a resource corresponding to an actual disk lock, and when the first identity identifier is consistent with the second identity identifier, the resource correspondingto the target disk lock and the resource corresponding to the actual disk lock are indicated to be actually the same resource, thereby ensuring that the resource obtained by the second node is the target resource indeed, and avoiding the problems of read-only of a file system or downtime of a server and the like.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a disk lock management method and device. Background technique [0002] A shared file system means that multiple nodes form a cluster, access the same storage space, read and write files on any node, and can still access the file on other nodes, and read and write permissions are negotiated between nodes through distributed locks. [0003] A disk lock is an implementation form of a distributed lock. The node that owns the disk lock is used to access the resources corresponding to the disk lock. Internet Protocol Storage Area Network, IP SAN) writes the locked and unlocked messages to the disk in the form of Small computer system interface (SCSI) commands, or in the form of SCSI commands through FC-SAN or IP-SAN Read the state of the lock from the disk to decide whether to lock or unlock it. [0004] In the prior art, the node holding the target disk lock will not distin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/176G06F3/06
Inventor 张端
Owner NEW H3C CLOUD TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products