Moving data from file on storage volume to alternate location to free space
First Claim
1. A method in connection with a computing device having a storage volume, a file system managing the storage volume, and a file stored on the storage volume by the file system and accessed by such file system, the file being defined to include data and metadata relating to the data but being in a ghosted form where the data has been moved to an alternate location to free space on the volume, the metadata of the ghosted file including ghosting information for being employed to at least partially retrieve the moved data for the file from the alternate location, the method in response to the file system receiving an open command from an application on the computing device with respect to the ghosted file and the file system upon receiving the open command noting that the ghosted file does not contain the moved data and returning an error, the method comprising a ghosting filter on the computing device:
- intercepting such returned error and perceiving based thereon that the file is in fact in a ghosted form;
commanding the file system to retrieve the ghosting information from the ghosted file and receiving such ghosting information;
creating a handle corresponding to the ghosted file, and delivering the handle to the application as the response to the open command therefrom;
receiving a read command from the application with respect to a portion of the data of the opened ghosted file, the read command having parameters including the handle and a definition of the portion including an offset into the portion of the data of the ghosted file and a read length with respect to such portion of the data;
initiating reconstituting of the portion of the data of the ghosted file based on the received ghosting information and the data of the ghosted file at the alternate location; and
after the portion of the data of the ghosted file has been reconstituted responding to the read command with the portion of the data requested.
2 Assignments
0 Petitions
Accused Products
Abstract
A ghosting filter on a computing device perceives that a file is in a ghosted form and commands a file system of the device to retrieve ghosting information from the ghosted file. The ghosting filter receives a read command from an application on the device with respect to a portion of the data of the ghosted file. The read command has parameters including an offset into the portion of the data and a read length with respect to such portion. The ghosting filter initiates reconstituting of the portion of the data of the ghosted file based on the received ghosting information and data of the ghosted file at an alternate location, and after the portion of the data of the ghosted file has been reconstituted responds to the read command with the portion of the data requested.
-
Citations
20 Claims
-
1. A method in connection with a computing device having a storage volume, a file system managing the storage volume, and a file stored on the storage volume by the file system and accessed by such file system, the file being defined to include data and metadata relating to the data but being in a ghosted form where the data has been moved to an alternate location to free space on the volume, the metadata of the ghosted file including ghosting information for being employed to at least partially retrieve the moved data for the file from the alternate location, the method in response to the file system receiving an open command from an application on the computing device with respect to the ghosted file and the file system upon receiving the open command noting that the ghosted file does not contain the moved data and returning an error, the method comprising a ghosting filter on the computing device:
-
intercepting such returned error and perceiving based thereon that the file is in fact in a ghosted form; commanding the file system to retrieve the ghosting information from the ghosted file and receiving such ghosting information; creating a handle corresponding to the ghosted file, and delivering the handle to the application as the response to the open command therefrom; receiving a read command from the application with respect to a portion of the data of the opened ghosted file, the read command having parameters including the handle and a definition of the portion including an offset into the portion of the data of the ghosted file and a read length with respect to such portion of the data; initiating reconstituting of the portion of the data of the ghosted file based on the received ghosting information and the data of the ghosted file at the alternate location; and after the portion of the data of the ghosted file has been reconstituted responding to the read command with the portion of the data requested. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method in connection with a computing device having a storage volume, a file system managing the storage volume, and a file stored on the storage volume by the file system and accessed by such file system, the method in response to the file system receiving an open command from an application on the computing device with respect to the ghosted file and the file system upon receiving the open command noting that the file has been ghosted in that data of the file has been moved to an alternate location and returning an error, the method comprising:
-
intercepting such returned error and perceiving based thereon that the file is in fact in a ghosted form; commanding the file system to retrieve ghosting information from the ghosted file and receiving such ghosting information; creating a handle corresponding to the ghosted file, and delivering the handle to the application as the response to the open command therefrom; receiving a read command from the application with respect to a portion of the data of the opened ghosted file, the read command having parameters including the handle and a definition of the portion including an offset into the portion of the data of the ghosted file and a read length with respect to such portion of the data; initiating reconstituting of the portion of the data of the ghosted file based on the received ghosting information and the data of the ghosted file at the alternate location; and after the portion of the data of the ghosted file has been reconstituted responding to the read command with the portion of the data requested. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification