A file system in a computer generally is part of the operating system that manages access to one or more storage devices. The file system provides an interface through which other applications can create files, write data to files and read data from files stored on the storage devices. The file system provides an abstraction layer between the details of managing the storage devices, such as the actual storage locations within each device where data is stored, and applications. This abstraction layer allows applications to identify files and access to files using references to files and locations within to files, without the need for the application to have information about the actual storage locations on the storage devices or other details about the storage devices. Typically, the references to files are defined as combinations of various file system objects, such as a name of a storage device or collection of storage devices, names of directories and paths of directories, names of file streams and files, or other types of file system objects. Each file system object generally is a named construct that represents data stored within the file system.
Within the file system, when data for a file is stored, it generally is broken into small chunks (often called blocks) which are stored on the storage device. The file system generally tracks, for each file, the storage locations within the storage device where each block of a file is stored, and the ordering of those blocks.
Some file systems, when writing data in a file, modify the data within the allocated blocks for the file. This is called “in-place” writing. Other file systems, when writing data in a file, are configured to provide a level of data integrity. For example, the file system may compute and store checksums of the stored data. As another example, “copy-on-write” can be used, which involves writing data to a free block of storage in a storage device, then change the file-to-block mapping to refer to the newly written block, with the overwritten data block being discarded. Both checksums and copy-on-write can be used, as well as other techniques for providing data integrity. While providing increased data integrity, techniques such as computing checksums and performing copy-on-write can reduce performance.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
A file system is provided in which writing with data integrity is a selectable attribute of a file system object, such that some file system objects have integrity on for various accesses, while other file system objects do not. Different default settings can be provided for different file system objects. For example, different default setting can be provided for different files in different directories, and for different file streams within a file. Such a setting for a file system object can be changed to and from having integrity on.
Given a file system object with an attribute, the file system can provide to users and other applications various file system operations for which the data integrity operation used on the file system object depends on this attribute. Such operations include, but are not limited to, operations for changing the attribute, creating file system objects with such attributes, providing and changing default settings for such attributes, and writing data to and reading data from files, which use different data integrity techniques based on this attribute. For example, different file system objects can use different kinds of data and file integrity, such as copy-on-write, checksums and other operations, based on this attribute.
In the following description, reference is made to the accompanying drawings which form a part hereof, and in which are shown, by way of illustration, specific example implementations of this technique. It is understood that other embodiments may be utilized and structural changes may be made without departing from the scope of the disclosure.
The following section provides an example computing environment in which a file system can be implemented.
The following description is intended to provide a brief, general description of a suitable computing environment in which a file system can be implemented. The system can be implemented with numerous general purpose or special purpose computing hardware configurations. Examples of well known computing devices that may be suitable include, but are not limited to, personal computers, server computers, hand-held or laptop devices (for example, media players, notebook computers, tablet and slate computers, cellular phones, personal data assistants, voice recorders), multiprocessor systems, microprocessor-based systems, set top boxes, game consoles, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
With reference to
Computing machine 100 may also contain communications connection(s) 112 that allow the device to communicate with other devices. Communications connection(s) 112 is an example of communication media. Communication media typically carries computer program instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal, thereby changing the configuration or state of the receiving device of the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media.
Computing machine 100 may have various input device(s) 114 such as a keyboard, mouse, pen, camera, touch input device, and so on. Output device(s) 116 such as a display, speakers, a printer, and so on may also be included. All of these devices are well known in the art and need not be discussed at length here. The input and output devices can provide a natural user interface, which is any interface technology that enables a user to interact with a device in a “natural” manner, free from artificial constraints imposed by input devices such as mice, keyboards, remote controls, and the like. Examples of NUI methods include those relying on speech recognition, touch and stylus recognition, gesture recognition both on screen and adjacent to the screen, air gestures, head and eye tracking, voice and speech, vision, touch, gestures, and machine intelligence. Specific categories of NUI technologies on which Microsoft is working include touch sensitive displays, voice and speech recognition, intention and goal understanding, motion gesture detection, such as by using cameras and/or accelerometers/gyroscopes, facial recognition, 3D displays, head, eye, and gaze tracking, immersive augmented reality and virtual reality systems, all of which provide a more natural interface, as well as technologies for sensing brain activity using electric field sensing electrodes.
A file system generally is implemented as part of an operating system of the computer, which manages access to various system resources by other computer programs. Typically, the file system and operating system are implemented using a computer program running on the computer, including computer-executable instructions and/or computer-interpreted instructions, such as program modules, being processed by the computing machine. Generally, program modules include routines, programs, objects, components, data structures, and so on, that, when processed by a processing unit, instruct the processing unit to perform particular tasks or implement particular abstract data types. This system may be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
Alternatively, or in addition, some of the functionality of the file system described herein can be performed, at least in part, by one or more hardware logic components. For example, and without limitation, illustrative types of hardware logic components that can be used include Field-programmable Gate Arrays (FPGAs), Program-specific Integrated Circuits (ASICs), Program-specific Standard Products (ASSPs), System-on-a-chip systems (SOCs), Complex Programmable Logic Devices (CPLDs), etc.
Given a computing machine such as described in
Referring to
Each file system object has one or more attributes, such as a name and other attributes that depend on the implementation of the file system. The attributes of a first file system object can include default settings for other file system objects which are created and dependent on the first file system object. For example, attributes of a directory can define default settings for files and file streams created within that directory. Attributes of a file, can define default setting for file streams included within that file.
A file, file stream or other similar object can also include an extent table that lists, for each portion of the file or file stream (such as a block) various information about that block, such as its location in storage, or other data. Such other data can include a checksum or other information used to provide storage integrity.
While the foregoing describes a file system that has file system objects within an object class hierarchy, other implementations of file systems using other types of data structures to represent file system structures also can be used, and the invention is not limited to the object types described above, or to an object-oriented implementation. The term “file system object” is intended to mean any implementation of a file system structure, such as a root directory, file or the like, depending on the file system, and is not limited to object-oriented implementations.
In general, a file system allows applications and user to create, within a root directory for a storage device or set of storage devices, multiple directories and other file objects within those directories, which creates a directory tree. The name of a storage volume, and the list of names of directories containing a file system object, is called a path. A computer program accesses a file system object through the file system by providing to the file system the path that contains the desired file system object and the name of the file system object.
A file system makes available to other computer programs a variety of operations, typically through a programming interface such as function calls and the like, which operations allow storage to be accessed. A file system may include operations that initialize a storage device (also called a “volume” herein) for use, and operations that create, read, write or update, or delete file objects. A computer program performs operations on a file system object by specifying the operation and the path and name for the file system object on which the operation is to be performed.
To implement a file system which can provide data integrity as a selectable attribute of a file, in one example, a file system object is defined to have an attribute indicating the kind of behavior to be provided for the object. This attribute can be a binary value indicating that integrity is either enabled or disabled. This attribute also can be implemented using a range of values of which one or more values are indicative of integrity being enabled or disabled. The attribute can be either expressly specified or inferred from one or more other attributes. As shown in
There are a variety of other ways to track whether a file system object has integrity on. For example, a table can be maintained in memory or storage indicating, for each file system object, whether that object has integrity on. A list of objects having integrity on can be maintained, with presence of an object in that list being indicative of it having integrity on. A characteristic of the file name, such as a file name extension indicating the type of the file, can be used to indicate that integrity is on. The type of the file system object also can be used to indicate that integrity is on. As another example, data within a file can be used to indicate this attribute as well.
Given a file system object that has an attribute indicative that integrity is on for that object, various file system operations are implemented so as to first check this attribute and then perform the operation in a manner depending on the value of that attribute. The following examples of operations will now be described: initializing a volume, creating a file system object (e.g., directory or file), writing a file, reading a file, changing the attribute for a file. This set of operations is not intended to be exhaustive, but merely illustrative of the kinds of operations that can be implemented differently depending on the attribute of a file system object.
Initializing a volume will now be described. When a volume is first mounted and its directory structure is initialized, the root directory object is created. The attribute for the root directory can be set to a default value indicating whether further file system objects created under the root directory will have integrity on.
Creating a file system object will now be described. When a file system object is created, whether a directory, file or file stream, the attribute for the directory or other file system object that will contain the object is retrieved 300. The new file system object is created 302, and its attribute is set 304 to the retrieved attribute of the containing directory.
Writing data to a file or similar object will now be described in connection with
Reading data from a file or similar object will now be described in connection with
A file system command can be provided to enable a user or an application to change the attribute of a file, whether enabling or disabling integrity. In one implementation, a file that has integrity on uses a checksum for each block. These checksums can be stored in the same extent table for the file system object that stores the storage location for the object, for example. In this implementation, when integrity is disabled, the checksums are not needed. So, in this implementation, when enabling integrity, the checksums are computed and stored and the attribute is changed after the checksums are stored. When disabling integrity in this implementation, the attribute is changed, then the checksums can be discarded by deleting them (thus making storage available) or otherwise marked as invalid. Use of such checksums can be independent of copy-on-write techniques.
Changing a file system object to disable integrity will now be described in connection with
Changing a file system object to enable integrity techniques will now be described in connection with
Having now described an example implementation, it should be apparent that other implementations are possible. Other types or attributes on file system objects can similarly be used to provide for different file system operations, such as providing different levels of data and file integrity, on different files based on the type or attribute of the file. It is also possible to provide such attributes for each extent within a file, to allow selectable integrity for each extent in a file.
Any or all of the aforementioned alternate embodiments described herein may be used in any combination desired to form additional hybrid embodiments. It should be understood that the subject matter defined in the appended claims is not necessarily limited to the specific implementations described above. The specific implementations described above are disclosed as examples only.
This application is a continuation of U.S. patent application Ser. No. 13/742,339, filed Jan. 15, 2013, to be issued as U.S. Pat. No. 9,183,246 on Nov. 10, 2015, which is hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
5182805 | Campbell | Jan 1993 | A |
5752251 | Cripps | May 1998 | A |
6393435 | Gartner | May 2002 | B1 |
6678700 | Moore | Jan 2004 | B1 |
6721764 | Hitz et al. | Apr 2004 | B2 |
7085909 | Ananthanarayanan et al. | Aug 2006 | B2 |
7240336 | Baker | Jul 2007 | B1 |
7441081 | Humlicek | Oct 2008 | B2 |
7584261 | Teodosiu | Sep 2009 | B1 |
7849057 | Kazar | Dec 2010 | B1 |
7882068 | Schack et al. | Feb 2011 | B2 |
7991748 | Rowan et al. | Aug 2011 | B2 |
8140964 | Cragun et al. | Mar 2012 | B2 |
8281293 | Fulton et al. | Oct 2012 | B2 |
8386835 | Dilger et al. | Feb 2013 | B2 |
8554734 | Chatterjee et al. | Oct 2013 | B1 |
8706701 | Stefanov et al. | Apr 2014 | B1 |
20030131197 | Morrison | Jul 2003 | A1 |
20030158834 | Sawdon et al. | Aug 2003 | A1 |
20030158861 | Sawdon et al. | Aug 2003 | A1 |
20050004925 | Stahl et al. | Jan 2005 | A1 |
20050065962 | Rowan et al. | Mar 2005 | A1 |
20060047925 | Perry | Mar 2006 | A1 |
20060074989 | Laborczfalvi | Apr 2006 | A1 |
20060090171 | Laborczfalvi | Apr 2006 | A1 |
20060248213 | Sherer | Nov 2006 | A1 |
20070044151 | Whitmore | Feb 2007 | A1 |
20070067321 | Bissett | Mar 2007 | A1 |
20070106677 | Moore | May 2007 | A1 |
20070240219 | Tuvell | Oct 2007 | A1 |
20080208924 | Bradshaw | Aug 2008 | A1 |
20080263043 | Kurichiyath et al. | Oct 2008 | A1 |
20090024827 | Davis | Jan 2009 | A1 |
20090077097 | Lacapra | Mar 2009 | A1 |
20090157716 | Kim | Jun 2009 | A1 |
20090323940 | Moffat | Dec 2009 | A1 |
20100223394 | Sherer | Sep 2010 | A1 |
20100228737 | Riemers | Sep 2010 | A1 |
20100293142 | Ackerman et al. | Nov 2010 | A1 |
20110022801 | Flynn | Jan 2011 | A1 |
20110055184 | Buban | Mar 2011 | A1 |
20110082838 | Niemela | Apr 2011 | A1 |
20110191394 | Winteregg | Aug 2011 | A1 |
20120110338 | Druschel et al. | May 2012 | A1 |
20130041872 | Aizman | Feb 2013 | A1 |
20130054530 | Baker et al. | Feb 2013 | A1 |
20130103644 | Shoens | Apr 2013 | A1 |
20130179480 | Agarwal et al. | Jul 2013 | A1 |
20140181051 | Montulli et al. | Jun 2014 | A1 |
20140188804 | Gokhale et al. | Jul 2014 | A1 |
20140188812 | Vijayan | Jul 2014 | A1 |
20160092467 | Lee et al. | Mar 2016 | A1 |
Entry |
---|
“Btrfs design”, states “Revision as of Dec. 11, 2010”, Retrieved From <<https://btrfs.wiki.kernel.org/index.php?title=Btrfs—design&oldid=4362>>, May 27, 2015, 9 Pages. |
“Basic Commands—Fedora Wiki”, Retrieved From <<http://fedora.wikia.com/wiki/Basic—Commands>>, May 27, 2015, 2 Pages. |
“Btrfs design”, Retrieved From <<https://btrfs.wiki.kernel.org/index.php/Btrfs—design>>, Jan. 11, 2015, 8 Pages. |
“Btrfs design, states Revision as of Oct. 22, 2012”, Retrieved From <<https://btrfs.wiki.kernel.org/index.php?title=Btrfs—design&oldid=14011>>, May 27, 2015, 8 Pages. |
“Btrfs(command)”, Retrieved From <<https://btrfs.wiki.kernel.org/index.php/Btrfs(command)>>, May 1, 2015, 5 Pages. |
“Changelog—btrfs Wiki”, Retrieved From <<https://btrfs.wiki.kernel.org/index.php/Changelog>>, May 26, 2015, 19 Pages. |
“Chattr( 1 )—Linux manual page”, Retrieved From <<http://man7.org/linux/man-pages/man1/chattr.1.html>>, May 27, 2015, 5 Pages. |
“DavidFarning/fedorafaqBasics”, Retrieved From <<https://fedoraproject.org/wiki/DavidFarning/fedorafaqBasics>>, May 24, 2008, 3 Pages. |
“FAQ”, Retrieved From <<https://btrfs.wiki.kernel.org/index.php?title=FAQ&oldid=16151>>, Jan. 4, 2013, 17 Pages. |
“FAQ—btrfs Wiki”, Retrieved From <<https://btrfs.wiki.kernel.org/index.php/FAQ>>, May 1, 2015, 22 Pages. |
“FAQ,—Revision as of Aug. 29, 2011”, Retrieved From <<https://btrfs.wiki.kernel.org/index.php?title=FAQ&oldid=7682>>, 12 Pages. |
“Fedora 20 Installation Guide”, Retrieved From <<https://docs.fedoraproject.org/en-US/Fedora/20/html/Installation—Guide/>>, 2013, 290 Pages. |
“Fedora Project—5.1 0.2 Moving Files and Directories”, Retrieved From <<https://docsfedoraproject.org/en-US/Fedora/13/html/Security-Enhanced—Linux/sect-Security-Enhanced—Linux-Maintaining—SELinux—Labels—-Moving—Files—and—Directories.html>>, Retrieved Date: May 1, 2015, 1 Page. |
“Fedora Project—9.14.4 Creates a Btrfs Volume”, Retrieved From <<https://docs.fedoraproject.org/en-US/Fedora/19/html/Installation—Guide/Create—Btrfs-x86.html>>, May 1, 2015, 2 Pages. |
“Fedora Project—Creating a Custom Partition Layout”, Retrieved From <<https://docs.fedoraproject.org/en-US/Fedora/20/html/Installation—Guide/s1-diskpartitioning-x86.html>>, Retrieved Date: May 1, 2015, 4 Pages. |
“Fedora Project : “Chapter 2. Obtaining Fedora””, Retrieved From <<https://docs.fedoraproject.org/en-US/Fedora/20/html/Installation—Guide/ch-new-users.html>>, Retrieved Date: May 1, 2015, 4 Pages. |
“Fedora Project.—18.2.2 Removing Software”, Retrieved From <<https://docs.fedoraproject.org/en-US/Fedora—Draft—Documentation/0.1/html/User—Guide/sect-User—Guide-Using—the'command—line—interface-Removing—software.html>>, Retrieved Date: May 1, 2015, 1 Page. |
“Fedora Project. “Btrfs””, Retrieved From <<https://fedoraproject.org/wiki/Btrfs>>, Retrieved Date: May 1, 2015, 2 Pages. |
“Glossary—btrfs Wiki”, Retrieved From <<https://btrfs.wiki.kernel.org/index.php/Glossary>>, Retrieved Date: May 1, 2015, 6 Pages. |
“Main Page—BTRFS Wiki”, Retrieved From <<https://btrfs.wiki.kernel.org/index.php/Main—Page>>, Retrieved Date: May 1, 2015, 5 Pages. |
“Revision history of FAQ”, Retrieved From <<https://btrfs.wiki.kernel.org/index.php?title=FAQ&action=history>>, Retrieved Date: May 27, 2015, 3 Pages. |
“Revision history of Btrfs design”, Retrieved From <<https://btrfs.wiki.kernel.org/index.php?title=Btrfs—design&action=history>>, Retrieved Date: May 27, 2015, 2 Pages. |
“Welcome to Fedora 20”, Retrieved From <<https://admin.fedoraproject.org/docs-backend/en-US/Fedora/20/html/Release—Notes/sect-Release—Notes-Welcome—to—Fedora—20.html>>, Retrieved Date: May 1, 2015, 3 Pages. |
“Non-final Office Action Issued in U.S. Appl. No. 13/742,339”, Mailed Date : Jul. 18, 2014, 11 Pages. |
“Notice of Allowance Issued in U.S. Appl. No. 13/742,339”, Mailed Date : Feb. 27, 2015, 15 Pages. |
“Notice of Allowance Issued in U.S. Appl. No. 13/742,339”, Mailed Date : Jun. 26, 2015, 9 Pages. |
Lee, et al., “WIPS : A Write-in-Place Snapshot File System for Storage-class Memory”, In Proceedings of Electronics Letters, vol. 48, Issue 17, Aug. 16, 2012, 2 Pages. |
Murray, Kate, “It's Not Just Integrity: Fixity Data in Digital Sound and Moving Image Files”, Retrieved From <<https://blogs.loc.gov/digitalpreservation/2014/03/its-not-just-integrity-fixity-data-in-digital-sound-and-moving-image-files/>>, Mar. 4, 2014, 3 Pages. |
Pace, Alberto, “Technologies for Large Data Management in Scientific Computing”, Retrieved at <<https://cds.cern.ch/record/1630387/files/CERN-IT-2013-005.pdf>>, Sep. 30, 2013, 64 Pages. |
Sinofsky, Steven, “Building the next generation file system for Windows: ReFS”, Retrieved From <<https://blogs.msdn.microsoft.com/b8/2012/01/16/building-the-next-generation-file-system-for-windows-refs/>>, Jan. 16, 2012, 50 Pages. |
Sivathanu, et al., “Ensuring Data Integrity in Storage: Techniques and Applications”, In Proceedings of the ACM workshop on Storage security and survivability, Nov. 11, 2005, 11 Pages. |
Zhang, et al., “End-to-end Data Integrity for File Systems: A ZFS Case Study”, In Proceedings of the 8th USENIX conference on File and storage technologies, Feb. 23, 2010, 14 Pages. |
Number | Date | Country | |
---|---|---|---|
20160140161 A1 | May 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13742339 | Jan 2013 | US |
Child | 14933066 | US |