File system management
First Claim
Patent Images
1. A method, comprising, by a kernel of a computing device:
- intercepting a first request to perform a first modification to a file;
in response to determining, based on a file attribute associated with the file,that a time restriction associated with copying the file is inactive;
invoking a user space file handler to generate a copy of the file, andin response to determining that the copy of the file has been generated by the user space file handler;
performing the first modification to the file;
intercepting a second request to perform a second modification to the file; and
in response to determining, based on the file attribute associated with the file, that the time restriction associated with copying the file is active;
performing the second modification to the file.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for file system management. In one aspect, a method includes receiving a request at a kernel to perform a file operation on a particular file; identifying a flag bit associated with the file; invoking user space file handler to perform particular action when the flag bit is set; determining whether notification that action has been performed by file handler is received; and allowing the file operation on the file when notification is received.
-
Citations
20 Claims
-
1. A method, comprising, by a kernel of a computing device:
-
intercepting a first request to perform a first modification to a file; in response to determining, based on a file attribute associated with the file, that a time restriction associated with copying the file is inactive; invoking a user space file handler to generate a copy of the file, and in response to determining that the copy of the file has been generated by the user space file handler; performing the first modification to the file; intercepting a second request to perform a second modification to the file; and in response to determining, based on the file attribute associated with the file, that the time restriction associated with copying the file is active; performing the second modification to the file. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing device, comprising:
-
at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the computing device to implement a kernel configured to; intercept a first request to perform a first modification to a file; in response to determining, based on a file attribute associated with the file, that a time restriction associated with copying the file is inactive; invoke a user space file handler to generate a copy of the file, and in response to determining that the copy of the file has been generated by the user space file handler; perform the first modification to the file; intercept a second request to perform a second modification to the file; and in response to determining, based on the file attribute associated with the file, that the time restriction associated with copying the file is active; perform the second modification to the file. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. At least one non-transitory computer readable storage medium storing instructions that, when executed by at least one processor included in a computing device, cause the computing device to implement a kernel configured to:
-
intercept a first request to perform a first modification to a file; in response to determining, based on a file attribute associated with the file, that a time restriction associated with copying the file is inactive; invoke a user space file handler to generate a copy of the file, and in response to determining that the copy of the file has been generated by the user space file handler; perform the first modification to the file; intercept a second request to perform a second modification to the file; and in response to determining, based on the file attribute associated with the file, that the time restriction associated with copying the file is active; perform the second modification to the file. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification