-
公开(公告)号:JPH08263356A
公开(公告)日:1996-10-11
申请号:JP888496
申请日:1996-01-23
Applicant: TANDEM COMPUTERS INC
Inventor: UIRIAMU JIEI KAAREI , JIEEMUZU EI RAIAN , MASHIYUU SHII MATSUKURIIN , MAIKERU JIEI SUKAAPEROSU
Abstract: PROBLEM TO BE SOLVED: To provide a method for limiting alteration access to a reserve sub volume only to an application process requiring to perform such access. SOLUTION: System critical files are protected so as not to be altered or eliminated by carelessness by placing them in the reserve name space of a storage device and requiring a process requesting the alteration access to the reserve name space to be provided with a right to do so. The right to the alteration access is acquired by the process of calling a system library processing procedure for altering a memory storage data structure relating to the called process first and identifying that the process is provided with the right to perform the alteration access to the reserve name space. A trial for altering, eliminating or preparing the file present in the reserve name space is denied without such a right.
-
公开(公告)号:JPH09204340A
公开(公告)日:1997-08-05
申请号:JP877596
申请日:1996-01-23
Applicant: TANDEM COMPUTERS INC
Inventor: MAIKERU JIEI SUKAAPEROSU , ROBAATO FUAN DERU RINDEN , UIRIAMU JIEI KAAREI , JIEEMUZU EI RAIAN , MASHIYUU SHII MATSUKURIIN
Abstract: PROBLEM TO BE SOLVED: To utilize a stored audit trace file for restoring on-line by enabling an audit trail constitution control processor to control the generation, renaming and erasing of the audit trace file on an audit trace disk storage device. SOLUTION: Both of a data disk processor 200 and the audit trace constitution control processor 220 generate an audit record so as to allow restoration to a consistent state in case of a fault. Primary and backup ADP controls the access of a disk volume storing the audit trace file. Primary ADP is normally provided with the control of disk access but in case of a fault, it is replaced with backup. In order to allow this taking over, primary ADP sends a periodical check point to the backup including all disk state information necessary for smooth taking over. These processings mutually work by exchanging messages through a messaging system 222.
-