SYSTEM AND METHOD FOR HIJACKING INODES BASED ON REPLICATION OPERATIONS RECEIVED IN AN ARBITRARY ORDER
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for hijacking inodes based on replication operations received in an arbitrary order is used to assist a data replication operation from a source storage system to a destination storage system. The source storage system generates a set of replication operations as part of a replication process and transmits the replication operations in an arbitrary order. After receiving a replication operation, the system determines whether the operation is inconsistent with a corresponding destination inode. If an inconsistency exists, the system hijacks the destination inode by replacing the destination inode'"'"'s metadata with data determined based on the replication operation. The system may also delete metadata from the inode and/or initialize metadata to default values if the metadata was not replaced based on the replication operation. The system then waits for a second replication operation that contains the remaining metadata and replaces the metadata based on the second replication operation. In addition, data blocks associated with the previous version of the inode are freed.
11 Citations
42 Claims
-
1-22. -22. (canceled)
-
23. An apparatus, comprising:
-
a storage operation interface configured to receive multiple replication operations for execution on a destination storage system, wherein the multiple replication operations include a first replication operation defining a modify operation directed to a metadata container type that differs from a destination metadata container type and a second replication operation defining a create operation; and logic, at least a portion of which is implemented in hardware, the logic to process storage operations in a network storage system, the logic comprising a highjack component to store metadata in a first part of a destination metadata container based on the first replication operation and to store metadata in a second part of the destination metadata container based on the second replication operation. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
-
30. A computer-implemented method, comprising:
-
receiving multiple replication operations for execution on a destination storage system in an arbitrary order, wherein the multiple replication operations include a first replication operation defining a modify operation directed to a metadata container type that differs from a destination metadata container type and a second replication operation defining a create operation; storing metadata in a first part of a destination metadata container based on the first replication operation; and storing metadata in a second part of the destination metadata container based on the second replication operation. - View Dependent Claims (31, 32, 33, 34, 35, 36)
-
-
37. One or more computer-readable media to store instructions that when executed by a processor circuit causes the processor circuit to:
-
receive multiple replication operations for execution on a destination storage system in an arbitrary order, wherein the multiple replication operations include a first replication operation defining a modify operation directed to a metadata container type that differs from a destination metadata container type and a second replication operation defining a create operation; store metadata in a first part of a destination metadata container based on the first replication operation; and store metadata in a second part of the destination metadata container based on the second replication operation. - View Dependent Claims (38, 39, 40, 41, 42)
-
Specification