File deletion and truncation using a zombie file space
First Claim
Patent Images
1. A method of operating a file server, comprising the steps of:
- identifying a file for deletion or truncation;
making said file unavailable to system users in a first file space;
linking said file to a second file space used for longer file operations than those performed in said first file space;
freeing blocks of said file while maintaining file consistency between check-pointed intervals; and
delinking said file from said second file space and making said file available to system users in said first file space if said file was identified for truncation.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for reliably performing extra-long operations in a reliable state-full system (such as a file system). The file system includes a separate portion of the file system reserved for files having extra-long operations in progress, including file deletion and file truncation. This separate portion of the file system is called the zombie file space; it includes a separate name space from the regular (“live”) file system that is accessible to users, and is maintained as part of the file system when recording a consistency point.
175 Citations
27 Claims
-
1. A method of operating a file server, comprising the steps of:
-
identifying a file for deletion or truncation;
making said file unavailable to system users in a first file space;
linking said file to a second file space used for longer file operations than those performed in said first file space;
freeing blocks of said file while maintaining file consistency between check-pointed intervals; and
delinking said file from said second file space and making said file available to system users in said first file space if said file was identified for truncation. - View Dependent Claims (2, 3, 4, 5, 25)
-
-
6. A method of operating a file server, comprising the steps of:
-
identifying a file for truncation;
making said file unavailable to system users in a first file space;
moving a portion of said file to a second file;
linking said second file to a second file space used for longer file operations than those performed in said first file space;
making said file available to system users in said first file space; and
deleting said second file while maintaining file consistency between check-pointed intervals. - View Dependent Claims (7, 8)
-
-
9. A file server, comprising:
-
a processor;
memory;
a network interface; and
mass storage;
wherein said processor operates under program control in said memory to control access to said mass storage, said program control including the steps of;
(a) identifying a file for deletion or truncation;
(b) making said file unavailable to system users in a first file space;
(c) linking said file to a second file space used for longer file operations than those performed in said first file space;
(d) freeing blocks of said file while maintaining file consistency between check-pointed intervals; and
(e) delinking said file from said second file space and making said file available to system users in said first file space if said file was identified for truncation.- View Dependent Claims (10, 11, 12, 13, 26)
-
-
14. A file server, comprising:
-
a processor;
memory;
a network interface; and
mass storage;
wherein said processor operates under program control in said memory to control access to said mass storage, said program control including the steps of;
(a) identifying a file in said mass storage for truncation;
(b) making said file unavailable to system users in a first file space;
(c) moving a portion of said file to a second file;
(d) linking said second file to a second file space used for longer file operations than those performed in said first file space;
(e) making said file available to system users in said first file space; and
(f) deleting said second file while maintaining file consistency between check-pointed intervals.- View Dependent Claims (15, 16)
-
-
17. A memory storing a program, said program comprising the steps of:
-
identifying a file for deletion or truncation;
making said file unavailable to system users in a first file space;
linking said file to a second file space used for longer file operations than those performed in said first file space;
freeing blocks of said file while maintaining file consistency between check-pointed intervals; and
delinking said file from said second file space and making said file available to system users in said first file space if said file was identified for truncation. - View Dependent Claims (18, 19, 20, 21, 27)
-
-
22. A memory storing a program, said program comprising the steps of:
-
identifying a file for truncation;
making said file unavailable to system users in a first file space;
moving a portion of said file to a second file used for longer file operations than those performed in said first file space;
linking said second file to a second file space;
making said file available to system users in said first file space; and
deleting said second file while maintaining file consistency between check-pointed intervals. - View Dependent Claims (23, 24)
-
Specification