Disk lock management method and device

A management method and a technology of a management device, which are applied in the field of disk lock management methods and devices, and can solve problems such as file system read-only, data inconsistency, and server downtime

Active Publication Date: 2021-05-07
NEW H3C CLOUD TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the object of the present invention is to provide a disk lock management method and device to avoid problems such as data inconsistency, file system read-only or server downtime caused by processing expired messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Disk lock management method and device
  • Disk lock management method and device
  • Disk lock management method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0045] The embodiment of the present invention provides a disk lock management method, which is applied to the first node of the shared file system 100, and the first node communicates with the second node of the shared file system 100 to avoid data lock caused by processing expired messages. Inconsistencies, read-only file systems, or server downtime.

[0046] It should be noted that the second node in this embodiment is the node 110 that initiates an access request to a certain resource 122 of the shared file system 100, and the first node is the node 110 that holds the disk lock 1222 corresponding to the resource 122 .

[0047] It should also be noted that, in other embodiments, the second node may be the node 110 holding the disk lock 1222 corresponding to the resource 122, and the first node may be a resource 122 that initiates an access request to the shared file system 100 Each node 110 can be a node 110 that initiates an access request to a certain resource 122 of the...

no. 2 example

[0069] The embodiment of the present invention provides a disk lock management method, which is applied to the second node of the shared file system 100, and the second node communicates with at least one first node of the shared file system 100, so as to avoid data inconsistency, file system read-only, or server downtime.

[0070] It should be noted that the second node in this embodiment is the node 110 that initiates an access request to a certain resource 122 of the shared file system 100, and at least one first node is mounted on the same shared file system as the second node The nodes 110 of 100 are the nodes 110 belonging to the same cluster. In addition, there may be a node 110 holding the target disk lock corresponding to the resource 122 in at least one first node, or there may not be a node 110 holding the target disk lock corresponding to the resource 122 .

[0071] see Image 6 , is a flow chart of the disk lock management method provided by the embodiment of th...

no. 3 example

[0094] The embodiment of the present invention provides a disk lock management device 200. It should be noted that the basic principles and technical effects of the disk lock management device 200 provided in this embodiment are the same as those of the first embodiment. For a brief description, For parts not mentioned in this embodiment, reference may be made to the corresponding content in the first embodiment. see Figure 7 , is a functional block diagram of the disk lock management device 200 provided by the embodiment of the present invention, the disk lock management device 200 includes: an information receiving unit 210, an analysis unit 220, a reading unit 230, a judging unit 240, and a disk lock management unit 250.

[0095] The information receiving unit 210 is configured to receive an unlock request transmitted by the second node based on the logical block address of the target disk lock and the first identifier of the resource 122 corresponding to the target disk l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a disk lock management method and device, which relate to the technical field of data processing. The method and device obtain the logical block address and the first identity by parsing the received unlocking request, and read the second identity of the resource corresponding to the actual disk lock when the actual disk lock corresponding to the logical block address is found , and when the first identity is consistent with the second identity, unlock the target disk lock so that the second node can lock the target disk lock. By judging whether the first identity of the resource corresponding to the target disk lock is consistent with the second identity of the resource corresponding to the actual disk lock, when the first identity is consistent with the second identity, it indicates that the resource corresponding to the target disk lock is consistent with The resource corresponding to the actual disk lock is actually the same resource, so as to ensure that the resource acquired by the second node is indeed the target resource, thereby avoiding problems such as file system read-only or server downtime.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a disk lock management method and device. Background technique [0002] A shared file system means that multiple nodes form a cluster, access the same storage space, read and write files on any node, and can still access the file on other nodes, and read and write permissions are negotiated between nodes through distributed locks. [0003] A disk lock is an implementation form of a distributed lock. The node that owns the disk lock is used to access the resources corresponding to the disk lock. Internet Protocol Storage Area Network, IP SAN) writes the locked and unlocked messages to the disk in the form of Small computer system interface (SCSI) commands, or in the form of SCSI commands through FC-SAN or IP-SAN Read the state of the lock from the disk to decide whether to lock or unlock it. [0004] In the prior art, the node holding the target disk lock will not distin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/176G06F3/06
Inventor 张端
Owner NEW H3C CLOUD TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products