Managing lock rankings
First Claim
1. A method of monitoring a computer system, the method comprising:
- calculating, by the computer system, a first checksum of a data location;
receiving a request from an operation running on the computer system for a first lock corresponding to the data location;
determining, by the computer system, whether the operation possesses a lock ranked higher than the first lock;
calculating, by the computer system, a second checksum of the data location; and
conditioned upon the first checksum and the second checksum being equivalent and on the operation not possessing a lock ranked higher than the first lock, issuing the first lock to the operation.
6 Assignments
0 Petitions
Accused Products
Abstract
Methods of monitoring a computer system. The methods may comprise the steps of calculating a first checksum of a data location and receiving a request from an operation running on the computer system for a lock corresponding to the data location. The methods may also comprise the steps of calculating a second checksum of the data location, and generating an indication if the first checksum and the second checksum are not equivalent. Also, methods of detecting a lock ranking violation in a computer system. The methods may comprise the steps of receiving a request from an operation for a first lock associated with a first data storage location and reviewing a list of locks issued to the operation. The methods may also comprise the step of determining whether the operation possesses a lock ranked higher than the first lock.
-
Citations
7 Claims
-
1. A method of monitoring a computer system, the method comprising:
-
calculating, by the computer system, a first checksum of a data location; receiving a request from an operation running on the computer system for a first lock corresponding to the data location; determining, by the computer system, whether the operation possesses a lock ranked higher than the first lock; calculating, by the computer system, a second checksum of the data location; and conditioned upon the first checksum and the second checksum being equivalent and on the operation not possessing a lock ranked higher than the first lock, issuing the first lock to the operation. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer readable medium having instructions stored thereon that when executed by a processor, cause the processor to perform the steps of:
-
calculating a first checksum of a data location; receiving a request from an operation running on the computer system for a first lock corresponding to the data location; determining whether the operation possesses a lock ranked higher than the first lock; calculating a second checksum of the data location; and conditioned upon the first checksum and the second checksum being equivalent and on the operation not possessing a lock ranked higher than the first lock, issuing the first lock to the operation.
-
Specification