USRE35881E - Method and system for traversing linked list record based upon write-once predetermined bit value of secondary pointers - Google Patents

Method and system for traversing linked list record based upon write-once predetermined bit value of secondary pointers Download PDF

Info

Publication number
USRE35881E
USRE35881E US08/531,460 US53146095A USRE35881E US RE35881 E USRE35881 E US RE35881E US 53146095 A US53146095 A US 53146095A US RE35881 E USRE35881 E US RE35881E
Authority
US
United States
Prior art keywords
file
pointer
entry
record
bit value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US08/531,460
Inventor
Phillip L. Barrett
Scott D. Quinn
Ralph A. Lipe
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to US08/531,460 priority Critical patent/USRE35881E/en
Application granted granted Critical
Publication of USRE35881E publication Critical patent/USRE35881E/en
Anticipated expiration legal-status Critical
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9017Indexing; Data structures therefor; Storage structures using directory or table look-up
    • G06F16/902Indexing; Data structures therefor; Storage structures using directory or table look-up using more than one table in sequence, i.e. systems with three or more layers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9017Indexing; Data structures therefor; Storage structures using directory or table look-up
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99951File or database maintenance
    • Y10S707/99952Coherency, e.g. same view to multiple users
    • Y10S707/99953Recoverability
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99951File or database maintenance
    • Y10S707/99956File allocation

Definitions

  • This invention relates generally to a computer system for managing files and, more specifically, to a method and system for managing files stored on a FlaSH-erasable, programmable, read-only memory (FEProm).
  • FEPm FlaSH-erasable, programmable, read-only memory
  • a computer system generally supports the storage of information on both volatile and nonvolatile storage devices.
  • the difference between a volatile and nonvolatile storage device is that when power is disconnected from a volatile storage device the information is lost. Conversely, when power is disconnected from a nonvolatile storage device the information is not lost.
  • the storing of information on a nonvolatile storage device allows a user to enter information at one time and retrieve the information at a later time, even though the computer system may have been powered down.
  • a user could also disconnect a nonvolatile storage device from a computer and connect the storage device to a different computer to allow the different computer to access the information.
  • the information stored on nonvolatile storage devices is generally organized into files.
  • a file is a collection of related information.
  • a computer system can store hundreds and thousands of files on a storage device, depending upon the capacity of the device.
  • the computer system will typically read, modify, and delete the information in the files. It is important that the computer system organize the files on the storage device so that the storing, reading, modifying, and deleting can be accomplished efficiently.
  • FIG. 1A shows a pictorial representation of the directory structure for a storage device.
  • Directories contain a logical group of files. Directories organize files in a manner that is analogous to the way that folders in a drawer organize the papers in the drawer.
  • DOS, WORD, DAVID, and MARY represent directories
  • the blocks labeled AUTOEXEC.BAT, COMMAND.COM, FORMAT.EXE, LETTER2.DOC, LETTER.DOC, and two files named LETTER1.DOC represent files.
  • the directory structure allows a user to organize files by placing related files in their own directories.
  • the directory WORD may contain all the files generated by the word-processing program WORD.
  • Within directory WORD are two subdirectories DAVID and MARY, which aid in further organizing the WORD files into those developed by David and those developed by Mary.
  • a storage device known as a FlaSH-EProm has the speed of internal computer memory combined with the nonvolatility of a computer disk.
  • This device is an EProm-type (Erasable, Programmable, Read-Only Memory) device.
  • the contents of the FEProm can be erased by applying a certain voltage to an input rather by shining ultraviolet light on the device like the typical EProm. The erasing sets each bit in the device to the same value.
  • the FEProm is a nonvolatile memory.
  • the FEProms are comparable in speed to the internal memory of a computer. Initially, and after erased, each bit of the FEProm is set to a 1.
  • a characteristic of the FEProm as with other EProms is that a bit value of 1 can be changed to a 0, but a bit value of 0 cannot be changed to a 1.
  • data can be written to the EProm to effect the changing of a bit from a 1 to a 0.
  • each bit of the FEProm can only be written once but read many times between subsequent erasures.
  • each bit of a FEProm can only be erased and set to 0 a limited number of times. The limited number of times defines the effective life of a FEProm.
  • a byte is the unit of addressability of the internal memory of the computer, that is, the computer can write or read one byte (typically, eight bits) at a time, but not less.
  • Block sizes can vary, but typically are a power of two (128, 256, 512, etc.). For example, if only one byte on a disk is to be changed, then the entire number of bytes in the block size must be written. This may involve the reading of the entire block from disk into the computer memory, changing the one byte (the internal memory is byte addressable), and writing the entire block to the disk.
  • Conventional file systems store data in a way that leaves unused portions of blocks.
  • the file systems store data from only one file in any given block at a time.
  • the file systems do not, for example, store data from one file in the first 50 bytes of a block and data from another file the last 78 bytes of a 128-byte block. If, however, the length of a file is not an even multiple of the block size, space at the end of a block is unused. In the example above, the last 78 bytes of the block would be unused.
  • a disk uses a large block size such as 4096, up to 4095 bytes of data can be unused. Although this used space may be a negligible amount on a disk drive that has multi-write capability and that can store millions of bytes, it may be a significant amount on a storage device without multi-write capability and without the capacity to store millions of bytes of data.
  • the FEProm in contrast to typical storage devices, is byte addressable, rather than block addressable. It would be desirable to have a file system that would support the byte addressability of a FEProm.
  • the system uses a secondary pointer to indicate that data stored in a file system data structure has been superseded.
  • the secondary pointer points to a record that contains the superseding data.
  • FIG. 1A shows a sample hierarchical or tree-structured organization of directories and files.
  • FIG. 1B shows a linked-list structure that represents the same directory structure of FIG. 1A.
  • FIG. 1C shows an alternate linked-list structure that represents the same directory structure of FIG. 1A.
  • FIG. 2A shows a linked-list structure for the file named " ⁇ A ⁇ D.DAT".
  • FIG. 2B shows an alternate linked-list structure for the file named " ⁇ A ⁇ D.DAT".
  • FIG. 3 shows the address space of the FEProm in a preferred embodiment of the present invention.
  • FIG. 4 shows a flow diagram of the Add -- Directory routine in a in a preferred embodiment of the present invention.
  • FIGS. 5 and 6 show before and after pictorials of the directory structure with a newly added directory in a preferred embodiment of the present invention.
  • FIGS. 7A and 7B show a before and after pictorial representation of the allocation of an FEDirEntry in a preferred embodiment of the present invention.
  • FIG. 8 shows a flow diagram of the Add File routine in a preferred embodiment of the present invention.
  • FIG. 9 shows a flow diagram of the Add -- Data -- To -- New -- File routine in a preferred embodiment of the present invention.
  • FIGS. 10A and 10B show a flow diagram of the Extend -- File routine in a preferred embodiment of the present invention.
  • FIG. 11 shows a sample directory and file layout using a preferred embodiment of the present invention.
  • FIG. 12 shows a flow diagram of the Update -- File routine in a preferred embodiment of the present invention.
  • FIGS. 13 and 14 show a sample portion of a file before and after it is updated in a preferred embodiment of the present invention.
  • FIGS. 15, 16 and 17 show sample portions of a file after the file is updated in a preferred embodiment of the present invention.
  • FIG. 18 shows a flow diagram of the Del -- Directory routine in a preferred embodiment of the present invention.
  • FIG. 19 shows a flow diagram of the Change -- File -- Name routine in a preferred embodiment of the present invention.
  • FIG. 20 shows the before and after representation of the directory structure for a file that has had its name changed.
  • FIGS. 21A and 21B show a flow diagram of the Change -- Attribute -- Data routine in a preferred embodiment of the present invention.
  • FIG. 22 shows the before and after representation of the directory structure for a file that has had its attribute date changed.
  • the present invention provides a directory-based hierarchical file system for a FEProm device.
  • a hierarchical file system provides a way to store files in logical groupings.
  • a preferred embodiment uses a lined-list data structure to implement both the directory hierarchy and the internal file storage.
  • FIG. 1A shows a typical hierarchical directory structure.
  • the MS-DOS operating system which is available from Microsoft Corporation of Redmond, Wash., implements a file system with a hierarchical directory structure.
  • the ROOT directory contains two subdirectories (DOS and WORD) and two files (AUTOEXEC.BAT and COMMAND.COM) at the next lower level.
  • the directory DOS contains one file (FORMAT.EXE).
  • the directory WORD contains two subdirectories (DAVID and MARY) at the next lower level.
  • the directory DAVID contains one file LETTER1.DOC.
  • the directory MARY contains three files LETTER1.DOC, LETTER2.DOC, and LETTER3.DOC.
  • FIG. 1B shows a possible linked list that in a preferred embodiment implements the directory structure of FIG. 1A.
  • the ROOT directory record (the terms record and entry are used interchangeably in this specification) has a pointer which points to a linked list of subdirectory records and file records at the next lower level.
  • the subdirectory record DOS has a pointer to the file record at the next lower level, and the subdirectory record WORD has a pointer to a linked list of subdirectory records at the next lower level.
  • the subdirectory record DAVID has a pointer to the file at the next lower level, and the subdirectory record MARY has a pointer to a linked list of file records at the next lower level.
  • the template 10 shows the record layout used throughout the drawings.
  • FIG. 1B represents just one possible linked list arrangement that represents FIG. 1A. The arrangement would be different if files had been added but then deleted or if the name of a directory was changed.
  • FIG. 1C shows another possible arrangement. FIG. 1C represents the same directory hierarchy as FIG. 1A, but the directory BILL existed at one time but has been deleted.
  • directory record BILL is not physically removed from the linked list.
  • a directory or file record is deleted from the linked list by logically clearing the exist/delete bit of the status byte of the directory or file entry. If the directory or file was stored on a computer disk, then directory record BILL could be physically removed by rewriting the pointer in directory record DAVID to point to directory record MARY.
  • a preferred embodiment also uses a linked-list data structure to link the extents that compose a file.
  • Each file has a file record associated with it that contains, among other data, the name of the file and that is linked into the directory hierarchy as described above.
  • An extent is a contiguous area of memory that contains data for the file.
  • Each file comprises one or more extents which contain the file data.
  • Each extent has an extent record associated with it.
  • the extent record contains, among other data, the start address of the extent and the length of the extent.
  • FIG. 2A shows the extents of the file " ⁇ A ⁇ D.DAT".
  • the file record (R0) also serves as the extent for the first extent in a file and contains a pointer to the first extent (E0).
  • the extent records (R1, R2, and R3) are linked and contain a pointer to the corresponding extents (E1, E2 and E3).
  • the file is the logical concatenation of extents E0, E1, E2, and E3.
  • FIG. 2A represents just one possible linked list arrangement for file " ⁇ A ⁇ D.DAT".
  • FIG. 2B shows another arrangement that represents the same file.
  • the extent E4 was added to the file but then deleted.
  • the file record R4 is not physically removed from the linked list of extents that compose the file. Rather, the record R4 is logically removed by setting the exist/delete bit of the status byte to indicate the record is deleted.
  • the file system adds directory records, file records, extent records, and extents by allocating space starting from address zero in the FEProm.
  • the file system treats the FEProm as a stack-like device. Data is pushed onto the stack to effect allocation, but data is never popped from the stack.
  • FIG. 3 shows the allocated and unallocated portion of a FEProm.
  • the variable first -- unallocated points to the lowest address in the unallocated portion.
  • Each byte of the unallocated portion contains FNULLs, since it has not yet been written to by the file system.
  • An FNULL is a byte that contains all 1s. When a FEProm is erased each byte contains an FNULL.
  • the first -- unallocated pointer is not stored on the FEProm.
  • the file system searches the FEProm from the highest address location to the lowest address for the first occurrence of a non-FNULL byte. The next higher address is the start of the unallocated area (first -- unallocated).
  • the file system should ensure that the data stored at the end of the allocated portion does not contain a FNULL. This can be accomplished by adding a non-FNULL byte to the end of any record or extent that ends in an FNULL.
  • Table 1 contains several data structures used in a preferred embodiment of the present invention. The structures are shown in C programming language format along with a description of the structure variables.
  • the first data structure stored on the FEProm is the boot -- record.
  • the boot -- record contains some general information relating to the identification of the FEProm, the version number of file system that can access the FEProm, the pointer -- size variable, and the root directory variable.
  • the pointer -- size indicates the byte-size of the pointers stored in the FEProm. For example, a pointer size with value of 3 indicates that each pointer is three bytes.
  • the root -- directory is a pointer to the root directory stored on the FEProm.
  • the second and third structures are the FEDirEntry and FEFileEntry structures.
  • One of these structures is allocated for each directory and file.
  • the structures are identical except that the FEFileEntry has extent location and extent length variables.
  • the variable sibling points to the next sibling in the linked list of FEDirEntry and FEFileEntry structures at the same level in the directory hierarchy.
  • the variables primary -- ptr and secondary -- ptr are fully described below.
  • FIG. 4 shows a flow diagram for the routine that adds a directory to a storage device.
  • the input parameters to this routine are the complete pathname of the new directory and attribute data for the new directory.
  • attribute data refers to the attribute, date, and time values.
  • This routine will set the variable P to point to the parent directory and the variable C to point to the child directory.
  • the path name " ⁇ P ⁇ C” means that a directory "C" is to be created that is a subdirectory of "P,” which is a subdirectory of the root directory.
  • FIGS. 5 and 6 show the directory structure before "C” is added and the broken lines show the directory structure after "C" is added.
  • the system locates directory "P" by following the path from the root directory and setting variable P to the address of "P" directory.
  • the system allocates a new directory entry of the record type FEDirEntry for directory "C.”
  • the system sets the variable C to the variable first -- unallocated and allocates the space by incrementing the variable first -- unallocated by the size of an FEDirEntry record.
  • FIGS. 7A and 7B show the address space before allocation and after allocation of the FEDirEntry record, respectively.
  • the system sets the variables name, time, date, and attribute in the newly allocated record.
  • the system sets the status bit to indicate that the newly allocated entry is a directory entry, rather than a file entry.
  • the system links the new directory entry into the old directory structure.
  • the system handles the situation where the new directory is not the first subdirectory of "P.”
  • the system handles the situation where the new directory is the first subdirectory of "P.”
  • P-->primary -- ptr equals FNULL, then the "P" directory has no subdirectory and the system continues at block 410, else the "P" directory has or has had a subdirectory (discussed below), and the system continues at block 406.
  • the system sets P-->primary -- ptr equal to the variable C, the address of the newly allocated directory entry to effect the liking to the new directory and then the routine is done.
  • next -- ptr equal to P-->primary -- ptr.
  • the variable next -- ptr contains the next directory in the chain of sibling subdirectories.
  • next -- ptr-->sibling equals FNULL, then the end of the chain of siblings has been reached and the system continues at block 409, else the system continues at block 408.
  • the system sets next -- ptr equal to next -- ptr-->sibling, which advances next -- ptr to point to the next directory in the chain, and continues at block 407 to determine if the end of the chain has been reached.
  • the system sets next -- ptr>sibling equal to C, the address of the newly allocated directory record and then the routine is done.
  • FIG. 8 shows a flow diagram of the routine that adds a record into the file system for a new file. Since FEFileEntry records are simply leaf nodes of the hierarchical tree-structured file system, the routine that adds the FEFileEntry records is very similar to the routine for FEDirEntry records, which is Add Directory, shown in FIG. 4. The significant difference is that the status bit that indicates the record is a directory is not cleared as in block 404 of FIG. 4. Thus, the status bit indicates the record is a file record.
  • FIG. 9 shows a flow diagram of the routine that adds data to a newly created file.
  • the routine is passed the complete pathname, the data to write, and the number of bytes to write.
  • the routine allocates space in the FEProm, writes the data, and then updates the FEFileEntry record for the file.
  • the system allocates the space in the FEProm for the extent.
  • the system sets the pointer extent -- start equal to first -- unallocated.
  • the system increments first -- unallocated by the number of bytes to write.
  • the system writes the data to the FEProm at the location pointed to by extent -- start.
  • the system locates the FEFileEntry record for the file by tracing down the pathname and sets F to point to that record.
  • the system sets F-->extent -- location equal to extent -- start.
  • the system sets F-->extent -- length equal to the number of bytes to write and then the routine is done.
  • FIGS. 10A and 10B show a flow diagram of the routine to add data onto the end of a file.
  • This routine is passed the complete pathname, the data to write, and the number of bytes to write.
  • FIG. 11 shows a sample layout of the directory structure that contains the file " ⁇ L.dat” that is to be extended. The solid lines show the structure before the file is extended and the broken lines show the structure after the file is extended.
  • the file "L.DAT" has a FEFileEntry record and a FEFileInfo record associated with it. Each of these records has a data extent, D1 or D2.
  • the broken lines represent a FEFileInfo record with the data to be added to the file in extent D3.
  • the system allocates a new FEFileInfo record in the FEProm and sets the pointer FI to contain the address of that record.
  • the system sets FI-->date, FI-->time, and FI-->attribute.
  • the system allocates space in the FEProm for the data that is to extend the file.
  • the system sets the variable extent -- start equal to first -- unallocated.
  • the system increments first -- unallocated by the number of bytes to write.
  • the system writes the data to the FEProm starting at the location pointed to by extent -- start.
  • the system locates the FEFileEntry record for the file to be extended and sets FE to point to that record.
  • the system would locate the FEFileEntry record before allocating the new extent and FEFileInfo record to ensure that the file exists before any allocation is done.
  • the system locates the last FEFileInfo record for the file to be extended.
  • the system follows the primary -- ptr or the secondary -- ptr of the FEFileEntry record and the FEFileInfo records.
  • a non-FNULL value in the secondary -- ptr field indicates that the record pointed to by the primary -- ptr has been superseded by the data in the record pointed to by the secondary -- ptr.
  • the system sets pointer next -- ptr equal to FE, which is the address of the FEFileEntry record.
  • the system sets the pointer prev -- ptr equal to next -- ptr.
  • the pointer prev -- ptr When the last FEFileInfo record in the file is located, the pointer prev -- ptr will contain the address of that record.
  • the system sets the next -- to>indicate that the attributes, date, and time are superseded. This will ensure that the newly allocated FEFileInfo record will be the only record for the file with current attribute, date, and time data.
  • next-->secondary -- ptr equals FNULL, then the data in the record pointed to by the primary -- ptr has not been superseded and the system continues at block 1010, else the system continues at block 1011.
  • next -- ptr equal to next -- ptr-->primary -- ptr to get the address of the next record in the linked list and continues at block 1012.
  • the system sets next equal to next -- ptr-->secondary -- ptr to get the address of the next record in the linked list and continues at block 1012.
  • next -- ptr equals FNULL, then the end of the list has been reached and the system continues at block 1013, else the system continues at 1008A to process the next record in the list.
  • prev -- ptr-->primary -- ptr equal to FI to effect the extending of the file and the routine is done.
  • FIG. 12 shows a flow diagram for the routine that updates the data in a file.
  • the parameters for this routine are R, the address of the FEFileEntry or FEFileInfo block that is to have its associated extent modified; extent -- offset, the offset into the extent for the new data; new -- data, the new data; data -- length, the length of the new data. Since the FEProm is effectively a write once device, at least until everything is erased, an area where data is stored cannot be rewritten when an update to a file occurs. In a preferred embodiment, the updated data is written to a different area of the FEProm, as described below.
  • FIG. 13 shows a typical portion of the linked list of the FEFileInfo records for a file.
  • the Update -- File routine will replace the data represented by the shaded area.
  • FIG. 14 shows the structure of the linked list after the modified data has been written to the FEProm. Three FEFileInfo records, R1, R2, and R3, have been inserted into the linked list The entire extent is not rewritten, rather only the portion that actually changed is rewritten. The routine divides the extent into three sections, D1, D2, and D3. Sections D1 and D3 contain data that is not changed by the update, and section D2 contains the data that will change. Each section will have a corresponding FEFileInfo record.
  • the FEFileInfo records R1, R2, and R3 are linked through their primary -- ptr.
  • the extent -- location field in R1 and R3 point to their corresponding extent sections and the extent length fields are set. However, a new extent has been allocated for the changed data corresponding to the new D2 section, which is pointed to by record R2.
  • the secondary -- ptr of record R points to FEFileInfo R1 to indicate that the primnary -- ptr of R is suspended.
  • the primary -- of FEFileInfo record R3 is set to the value contained in the primary -- ptr of FEFileInfo record R to complete the link.
  • the system allocates three FEFileInfo records and sets the pointers R1, R2, and R3 to contain the addresses.
  • R1 is allocated with and R2 and R3 are allocated without the attribute data.
  • the system sets R1-->time, R1-->date, and R1-->attributes and R2-->status and R3-->status to superseded.
  • the system allocates a record of data -- length for the new data
  • the system sets the variable extent -- start equal to first -- unallocated.
  • the system increments first -- unallocated by data -- length.
  • the system writes new -- data to the FEProm starting at the address extent -- start.
  • the system sets the data in FEFileInfo record R2.
  • the system sets R2-->extent -- location equal to extent -- start.
  • the system sets R1-->extent -- length equal to data -- length.
  • the system sets R2-->primary -- ptr to R3.
  • the system sets the data in FEFileInfo record R3.
  • the system sets R3-->extent -- location equal to R-->extent -- location plus extent -- offset plus data -- length, which is the start address of section D3.
  • the system sets R3-->exten -- length equal to R-->extent -- length. minus R3-->extent -- location.
  • the system sets R3-->primry -- pointer equal to R-->primary -- ptr.
  • the system sets the data in FEFileInfo record R1.
  • the system sets R1-->extent -- location equal to R-->extent -- location.
  • the system sets R-->extent -- length equal to extent -- offset.
  • the system sets (R1-->primary -- otr to R2.
  • the system sets R-->secondary -- ptr equal to R1, which indicates that the primary -- ptr is superseded, and then the routine is done.
  • FIGS. 15 and 16 show the FEFileInfo list for a couple special cases of file updates.
  • the routine for processing for these special cases is a subset of the routine needed for processing the general case, Update -- File, shown in FIG. 12.
  • FIG. 15 data starting at the beginning of an extent is updated.
  • Section D1 contains the data at the beginning of the extent to be updated and section D2 contains the data at the end of the extent that is not updated. Only two new FEFileInfo records are needed.
  • the first FEFileInfo record R1 points to the new data and the second FEFileInfo record R2 points to the old data.
  • a similar situation occurs when data that ends on an extent boundary is updated as shown in FIG. 16.
  • FIG. 17 shows a linked list for FEFileInfo records when the updated data spans extent boundaries.
  • FIG. 18 shows a flow diagram of a routine that deletes a directory or file from the FEProm. This routine clears the exist/delete bit in the FEDirEntry.
  • the system locates the directory or file to be deleted and sets the pointer D to contain the address of the directory or file.
  • the system sets D-->status to indicate that the directory or file is deleted and the routine completes.
  • FIG. 20 shows the file entry for "D.DAT" in solid lines and the changes in broken lines when the name is changed to "B.DAT.”
  • the new entry points to the linked list of FEFileInfo entries, the directory structure, and the extent associated with the old entry.
  • FIG. 19 is a flow diagram of a preferred subroutine that implements the changing of a file name.
  • the subroutine for changing a directory is similar, except that there are no associated extents.
  • the input parameters to this routine are the pathname of the file and the new file name.
  • the system searches through the directory structure and locates the file whose name is to be changed and sets the variable P to point to the FEFileEntry.
  • the system searches for the last FEFileEntry in the linked list of entries for the file.
  • a file will have an entry for each name change
  • P-->secondary -- ptr equals FNULL
  • the system sets P equal to P-->secondary -- otr to walk through the linked list.
  • the system allocates a new FEFileEntry and sets the variable C to point to the entry.
  • the system set C-->name equal to the new file name.
  • the system sets C-->sibling equal to P-->sibling to link the entry into the directory hierarchy.
  • the system sets C-->extent -- location and C-->extent -- length equal to P-->extent -- location and P-->extent -- length, respectively, to link the new entry to the extent.
  • the system sets C-->primry -- ptr equal to P-->primary -- ptr to link the new entry to the list of extents.
  • the system sets P-->secondary -- ptr equal to C to complete the replacement of the old entry and the routine completes.
  • the attribute data associated with a file are changed by adding a new FEFileInfo entry onto the linked list of FEFileInfo entries. All FEFileInfo entries except the last are set to indicate that the attribute data have been superseded.
  • FIG. 22 shows the linked list arrangement before the attribute data change in solid lines and after the attribute data the change in broken lines. No extent is associated with the FEFileInfo entry that is added as a result of an attribute data change.
  • FIGS. 21A and 21B show a flow diagram of a routine that changes the attribute data of a file.
  • the input parameters are the pathname and the attribute data.
  • the system searches through the directory structure to locate the file and sets the variable P to point to the FEFileEntry.
  • the system searches for the last FEFileEntry in the linked list of entries for the file. A file will have an entry for each name change.
  • P-->secondary -- ptr equals FNULL, then P points to the end of the linked list and the system continues at block 2104, else P does not point to the end of the linked list and the system continues at block 2103.
  • the system sets P equal to P-->secondary -- ptr to walk through the linked list.
  • the system sets the variable C equal to P-->primary -- ptr, which points to the linked list of FEFileInfo entries for the file.
  • the system searches through the FEFileInfo entries for the last entry. If a secondary -- ptr is set, the system follows that path, otherwise it follows the primary -- ptr. If both primary -- ptr and secondary -- ptr are equal to FNULL, then the system has located the end of the linked list In block 2105, if C-->secondary -- ptr equals FNULL, then the system continues at block 2108, else the system continues at block 2106. In block 2106, the system sets C-->status to indicate that the attribute data are superseded. The new FEFileInfo entry will contain the new attribute data. In block 2107, the system sets C equal C-->secondary -- ptr to traverse the linked list and the system loops to 2105.
  • the system allocates a new FEFileEntry and sets the variable R to point to the entry.
  • the systems sets the attribute data for the new file entry.
  • the system sets C-->primary -- ptr equals R to link the new entry with the other FEFileInfo entries and the routine completes.
  • the FEFileEntry records and the FEFileInfo records are allocated after the space for extent is allocated. Storing in this manner has two advantages. First, it ensures that the allocated space will never end in an FNULL. Second, several writes can be combined into one large extent. The combining of the writes can occur up to the point at which FEDirEntry, FEFileEntry, or a FEFileInfo (for a different file) are to be added to the FEProm. At that point, the combined FEFileInfo record could be written out.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A method and apparatus for storing files on a computer file storage device. The files are organized into an hierarchical directory structure. The directory structure comprises directory entries and file entries. The file entries and directory each contain a primary and a secondary pointer. The secondary pointer is initially set to a predefined value. When an entry is to be updated, the secondary pointer is overridden with a value that points to the superseding entry. This directory structure is especially suitable to be used in a write-once computer memory.

Description

DESCRIPTION Technical Field
This invention relates generally to a computer system for managing files and, more specifically, to a method and system for managing files stored on a FlaSH-erasable, programmable, read-only memory (FEProm).
Background Art
A computer system generally supports the storage of information on both volatile and nonvolatile storage devices. The difference between a volatile and nonvolatile storage device is that when power is disconnected from a volatile storage device the information is lost. Conversely, when power is disconnected from a nonvolatile storage device the information is not lost. Thus, the storing of information on a nonvolatile storage device allows a user to enter information at one time and retrieve the information at a later time, even though the computer system may have been powered down. A user could also disconnect a nonvolatile storage device from a computer and connect the storage device to a different computer to allow the different computer to access the information.
The information stored on nonvolatile storage devices is generally organized into files. A file is a collection of related information. Over the course of time, a computer system can store hundreds and thousands of files on a storage device, depending upon the capacity of the device. In addition to storing the information, the computer system will typically read, modify, and delete the information in the files. It is important that the computer system organize the files on the storage device so that the storing, reading, modifying, and deleting can be accomplished efficiently.
File systems, which are generally part of a computer operating system, were developed to aid in the management of the files on storage devices. One such file system was developed by Microsoft Corporation for its Disk Operating System (MS-DOS). This file system uses a hierarchical approach to storing files. FIG. 1A shows a pictorial representation of the directory structure for a storage device. Directories contain a logical group of files. Directories organize files in a manner that is analogous to the way that folders in a drawer organize the papers in the drawer. The blocks labeled DOS, WORD, DAVID, and MARY represent directories, and the blocks labeled AUTOEXEC.BAT, COMMAND.COM, FORMAT.EXE, LETTER2.DOC, LETTER.DOC, and two files named LETTER1.DOC represent files. The directory structure allows a user to organize files by placing related files in their own directories. In this example, the directory WORD may contain all the files generated by the word-processing program WORD. Within directory WORD are two subdirectories DAVID and MARY, which aid in further organizing the WORD files into those developed by David and those developed by Mary.
Conventional file systems take advantage of the multiple-write capability of the nonvolatile store devices. The multiple-write capability allows any bit of information on the storage device to be changed from a one to zero and from a zero to one a virtually unlimited number of times. This capability allows a file to be written to the storage device and then selectively modified by changing some bits of the file.
The disadvantage of the conventional storage devices with multiple-write capability, such as a disk, is their slow speed relative to the speed of the internal computer memory. Conversely, the advantage of these storage devices over computer memory include their nonvolatility, low cost, and high capacity
A storage device known as a FlaSH-EProm (FEProm) has the speed of internal computer memory combined with the nonvolatility of a computer disk. This device is an EProm-type (Erasable, Programmable, Read-Only Memory) device. The contents of the FEProm can be erased by applying a certain voltage to an input rather by shining ultraviolet light on the device like the typical EProm. The erasing sets each bit in the device to the same value. Like other EProms, the FEProm is a nonvolatile memory. The FEProms are comparable in speed to the internal memory of a computer. Initially, and after erased, each bit of the FEProm is set to a 1. A characteristic of the FEProm as with other EProms is that a bit value of 1 can be changed to a 0, but a bit value of 0 cannot be changed to a 1. Thus, data can be written to the EProm to effect the changing of a bit from a 1 to a 0. However, once a bit is changed to a 0, it cannot be changed back to a 1, that is, unless the entire FEProm is erased to all ones. Effectively, each bit of the FEProm can only be written once but read many times between subsequent erasures. Moreover, each bit of a FEProm can only be erased and set to 0 a limited number of times. The limited number of times defines the effective life of a FEProm.
Because conventional file systems assume that the storage device has the multiple-write capability, these file systems are not appropriate for the FEProm, which effectively has only a single-write capability. It would be desirable to have a file system that supports a storage device based on the FEProm. Such a file system would have the speed of computer memory and the nonvolatility of computer disks.
Conventional storage devices, such as computer disks, are block addressable, rather than byte addressable. A byte is the unit of addressability of the internal memory of the computer, that is, the computer can write or read one byte (typically, eight bits) at a time, but not less. When the computer writes to or reads from a disk it must do so in groups of bytes called a block. Block sizes can vary, but typically are a power of two (128, 256, 512, etc.). For example, if only one byte on a disk is to be changed, then the entire number of bytes in the block size must be written. This may involve the reading of the entire block from disk into the computer memory, changing the one byte (the internal memory is byte addressable), and writing the entire block to the disk.
Conventional file systems store data in a way that leaves unused portions of blocks. The file systems store data from only one file in any given block at a time. The file systems do not, for example, store data from one file in the first 50 bytes of a block and data from another file the last 78 bytes of a 128-byte block. If, however, the length of a file is not an even multiple of the block size, space at the end of a block is unused. In the example above, the last 78 bytes of the block would be unused. When a disk uses a large block size such as 4096, up to 4095 bytes of data can be unused. Although this used space may be a negligible amount on a disk drive that has multi-write capability and that can store millions of bytes, it may be a significant amount on a storage device without multi-write capability and without the capacity to store millions of bytes of data.
The FEProm, in contrast to typical storage devices, is byte addressable, rather than block addressable. It would be desirable to have a file system that would support the byte addressability of a FEProm.
DISCLOSURE OF THE INVENTION
It is an object of the present invention to provide a method of updating data stored on a file storage device.
It is another object of the present invention to provide a method of storing a file on a file storage device.
It is another object of the present invention to provide a method of updating directory and file entries of a hierarchical directory structure on a file storage device.
It is another object of the present invention to provide a method of updating a file on a file storage device, the file having a linked list of information entries and the information entries having associated extents.
It is another object of the present invention to provide a method of updating a portion of a file extent stored on a file storage device.
These and other objects, which will become apparent as the invention is more fully described below, are obtained by an improved method and system for storing and updating files stored on a FlaSH-erasable, programmable, read-only memory. In a preferred embodiment, the system uses a secondary pointer to indicate that data stored in a file system data structure has been superseded. The secondary pointer points to a record that contains the superseding data.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1A shows a sample hierarchical or tree-structured organization of directories and files.
FIG. 1B shows a linked-list structure that represents the same directory structure of FIG. 1A.
FIG. 1C shows an alternate linked-list structure that represents the same directory structure of FIG. 1A.
FIG. 2A shows a linked-list structure for the file named "\A\D.DAT".
FIG. 2B shows an alternate linked-list structure for the file named "\A\D.DAT".
FIG. 3 shows the address space of the FEProm in a preferred embodiment of the present invention.
FIG. 4 shows a flow diagram of the Add-- Directory routine in a in a preferred embodiment of the present invention.
FIGS. 5 and 6 show before and after pictorials of the directory structure with a newly added directory in a preferred embodiment of the present invention.
FIGS. 7A and 7B show a before and after pictorial representation of the allocation of an FEDirEntry in a preferred embodiment of the present invention.
FIG. 8 shows a flow diagram of the Add File routine in a preferred embodiment of the present invention.
FIG. 9 shows a flow diagram of the Add-- Data-- To-- New-- File routine in a preferred embodiment of the present invention.
FIGS. 10A and 10B show a flow diagram of the Extend-- File routine in a preferred embodiment of the present invention.
FIG. 11 shows a sample directory and file layout using a preferred embodiment of the present invention.
FIG. 12 shows a flow diagram of the Update-- File routine in a preferred embodiment of the present invention.
FIGS. 13 and 14 show a sample portion of a file before and after it is updated in a preferred embodiment of the present invention.
FIGS. 15, 16 and 17 show sample portions of a file after the file is updated in a preferred embodiment of the present invention.
FIG. 18 shows a flow diagram of the Del-- Directory routine in a preferred embodiment of the present invention.
FIG. 19 shows a flow diagram of the Change-- File-- Name routine in a preferred embodiment of the present invention.
FIG. 20 shows the before and after representation of the directory structure for a file that has had its name changed.
FIGS. 21A and 21B show a flow diagram of the Change-- Attribute-- Data routine in a preferred embodiment of the present invention.
FIG. 22 shows the before and after representation of the directory structure for a file that has had its attribute date changed.
DETAILED DESCRIPTION OF THE INVENTION
              TABLE 1                                                     
______________________________________                                    
DETAILED DESCRIPTION OF THE INVENTION                                     
______________________________________                                    
typedef boot.sub.-- record {                                              
word           standard.sub.-- identifier;                                
dword          unique.sub.-- identifier;                                  
word           FS.sub.-- version.sub.-- write;                            
word           min.sub.-- FS.sub.-- version.sub.-- to.sub.-- read;        
byte           pointer.sub.-- size;                                       
FEptr          root.sub.-- directory;                                     
char           vol.sub.-- label 11!                                       
char           boot.sub.-- info . . .!;}                                  
standard.sub.-- identifier                                                
               value which indicates that the                             
               media supports this file system                            
unique.sub.-- identifier                                                  
               combined with vol.sub.-- label is a                        
               unique identifier for the                                  
               particular FEProm                                          
FS.sub.-- version.sub.-- write                                            
               version number in high byte and                            
               revision number in low byte of                             
               file system that is required to                            
               write to this volume                                       
min.sub.-- FS.sub.-- version.sub.-- to.sub.-- read                        
               version number in high byte and                            
               revision number in low byte of                             
               the earliest version of file                               
               system that directory structure                            
               is compatible with                                         
pointer.sub.-- size                                                       
               number of bits used in pointers                            
root.sub.-- directory                                                     
               pointer to root directory                                  
vol.sub.-- label                                                          
               eleven character label                                     
boot.sub.-- info                                                          
               data relating to booting the                               
               operating system                                           
typedef status.sub.-- type {                                              
unsigned bit.sub.-- 0:1;                                                  
unsigned bit.sub.-- 1:1;                                                  
unsigned bit.sub.-- 2:1;                                                  
unsigned bit.sub.-- 3:1;                                                  
unsigned bit.sub.-- 4:1;                                                  
unsigned bit.sub.-- 5:1;                                                  
unsigned bit.sub.-- 6.sub.-- 7:2;}                                        
typedef FEDirEntry {                                                      
FEPtr          sibling;                                                   
char           name 8!;                                                   
char           ext 3!;                                                    
status.sub.-- type                                                        
               status;                                                    
FEPtr          primary.sub.-- ptr;                                        
FEPtr          secondary.sub.-- ptr;                                      
byte           attributes;                                                
short          time;                                                      
short          date;};                                                    
typedef FEFileEntry {                                                     
FEPtr          sibling;                                                   
char           name 8!;                                                   
char           ext 3!;                                                    
status.sub.-- type                                                        
               status;                                                    
FEPtr          primary.sub.-- ptr;                                        
FEPtr          secondary.sub.-- ptr;                                      
byte           attributes;                                                
short          time;                                                      
short          date;                                                      
FEPtr          extent.sub.-- location;                                    
short          extent.sub.-- length;}                                     
typedef FEFileInfo {                                                      
byte           status;                                                    
FEPtr          primary.sub.-- ptr;                                        
FEPtr          secondary.sub.-- ptr;                                      
FEPtr          extent.sub.-- location;                                    
short          extent.sub.-- length;                                      
byte           attributes;                                                
short          time;                                                      
short          date;                                                      
sibling        pointer to next directory entry in                         
               sibling chain                                              
name           directory/file name                                        
ext            file extension                                             
status                                                                    
bit #          meaning                                                    
0              1: record exists in the directory                          
               structure                                                  
               0: record has been deleted from the                        
               directory structure                                        
1              1: record contains current attributes,                     
               date, and time data                                        
               0: record contains data that has been                      
               superseded or no data                                      
2              1: FEFileEntry                                             
               0: FEDirEntry                                              
3              1: sibling is FNULL                                        
               0: sibling is not FNULL                                    
4              1: primary.sub.-- ptr is FNULL                             
               0: primary.sub.-- ptr is not FNULL                         
5              1: secondary.sub.-- ptr is FNULL                           
               0: secondary.sub.-- ptr is not FNULL                       
6-7            reserved                                                   
primary.sub.-- ptr                                                        
               FEDirEntry: points to the first                            
               FEDirEntry or FEFileEntry on the                           
               next lower level in the directory                          
               hierarchy; only valid if                                   
               secondary.sub.-- ptr equals FNULL                          
               FEFileEntry: points to the linked                          
               list of FEFileInfo entries associated                      
               with the file; only valid if                               
               secondary.sub.-- ptr equals FNULL                          
               FEFileInfo: points to the next                             
               FEFileInfo entry for the file; only                        
               valid if secondary.sub.-- ptr equals                       
               FNULL                                                      
secondary.sub.-- ptr                                                      
               FEDirEntry: points to the next                             
               FEDirEntry entry for the directory;                        
               the last entry in the linked list                          
               contains the current information for                       
               the directory; only valid if not                           
               FNULL                                                      
               FEFileEntry: points to the next                            
               FEFileEntry entry for the file; the                        
               last entry in the linked list contains                     
               the current information for the file;                      
               only valid if not FNULL                                    
               FEFileInfo: points to the next                             
               FEFileInfo entry for the file; only                        
               valid if not FNULL                                         
attributes     file attributes such as read-only,                         
               read/write, etc.                                           
time           time of creation or modification                           
date           date of creation or modification                           
extent.sub.-- location                                                    
               points to start of extent                                  
extent.sub.-- length                                                      
               length of extent in bytes                                  
______________________________________                                    
The present invention provides a directory-based hierarchical file system for a FEProm device. A hierarchical file system provides a way to store files in logical groupings. A preferred embodiment uses a lined-list data structure to implement both the directory hierarchy and the internal file storage.
FIG. 1A shows a typical hierarchical directory structure. The MS-DOS operating system, which is available from Microsoft Corporation of Redmond, Wash., implements a file system with a hierarchical directory structure. As shown in FIG. 1A, the ROOT directory contains two subdirectories (DOS and WORD) and two files (AUTOEXEC.BAT and COMMAND.COM) at the next lower level. The directory DOS contains one file (FORMAT.EXE). The directory WORD contains two subdirectories (DAVID and MARY) at the next lower level. The directory DAVID contains one file LETTER1.DOC. The directory MARY contains three files LETTER1.DOC, LETTER2.DOC, and LETTER3.DOC.
FIG. 1B shows a possible linked list that in a preferred embodiment implements the directory structure of FIG. 1A. The ROOT directory record (the terms record and entry are used interchangeably in this specification) has a pointer which points to a linked list of subdirectory records and file records at the next lower level. The subdirectory record DOS has a pointer to the file record at the next lower level, and the subdirectory record WORD has a pointer to a linked list of subdirectory records at the next lower level. The subdirectory record DAVID has a pointer to the file at the next lower level, and the subdirectory record MARY has a pointer to a linked list of file records at the next lower level. The template 10 shows the record layout used throughout the drawings.
FIG. 1B represents just one possible linked list arrangement that represents FIG. 1A. The arrangement would be different if files had been added but then deleted or if the name of a directory was changed. FIG. 1C shows another possible arrangement. FIG. 1C represents the same directory hierarchy as FIG. 1A, but the directory BILL existed at one time but has been deleted.
Because a FEProm device can be written only once, in a preferred embodiment of the present invention, directory record BILL, as shown in FIG. 1C, is not physically removed from the linked list. A directory or file record is deleted from the linked list by logically clearing the exist/delete bit of the status byte of the directory or file entry. If the directory or file was stored on a computer disk, then directory record BILL could be physically removed by rewriting the pointer in directory record DAVID to point to directory record MARY.
A preferred embodiment also uses a linked-list data structure to link the extents that compose a file. Each file has a file record associated with it that contains, among other data, the name of the file and that is linked into the directory hierarchy as described above. An extent is a contiguous area of memory that contains data for the file. Each file comprises one or more extents which contain the file data. Each extent has an extent record associated with it. The extent record contains, among other data, the start address of the extent and the length of the extent. FIG. 2A shows the extents of the file "\A\D.DAT". The file record (R0) also serves as the extent for the first extent in a file and contains a pointer to the first extent (E0). The extent records (R1, R2, and R3) are linked and contain a pointer to the corresponding extents (E1, E2 and E3). The file is the logical concatenation of extents E0, E1, E2, and E3.
FIG. 2A represents just one possible linked list arrangement for file "\A\D.DAT". FIG. 2B shows another arrangement that represents the same file. The extent E4 was added to the file but then deleted. In a preferred embodiment, the file record R4 is not physically removed from the linked list of extents that compose the file. Rather, the record R4 is logically removed by setting the exist/delete bit of the status byte to indicate the record is deleted.
In a preferred embodiment of the present invention, the file system adds directory records, file records, extent records, and extents by allocating space starting from address zero in the FEProm. The file system treats the FEProm as a stack-like device. Data is pushed onto the stack to effect allocation, but data is never popped from the stack. FIG. 3 shows the allocated and unallocated portion of a FEProm. The variable first-- unallocated points to the lowest address in the unallocated portion. Each byte of the unallocated portion contains FNULLs, since it has not yet been written to by the file system. An FNULL is a byte that contains all 1s. When a FEProm is erased each byte contains an FNULL.
In a preferred embodiment, the first-- unallocated pointer is not stored on the FEProm. When a FEProm is first connected to the computer (i.e., put on-line), the file system searches the FEProm from the highest address location to the lowest address for the first occurrence of a non-FNULL byte. The next higher address is the start of the unallocated area (first-- unallocated). The file system should ensure that the data stored at the end of the allocated portion does not contain a FNULL. This can be accomplished by adding a non-FNULL byte to the end of any record or extent that ends in an FNULL.
Table 1 contains several data structures used in a preferred embodiment of the present invention. The structures are shown in C programming language format along with a description of the structure variables. The first data structure stored on the FEProm is the boot-- record. The boot-- record contains some general information relating to the identification of the FEProm, the version number of file system that can access the FEProm, the pointer-- size variable, and the root directory variable. The pointer-- size indicates the byte-size of the pointers stored in the FEProm. For example, a pointer size with value of 3 indicates that each pointer is three bytes. The root-- directory is a pointer to the root directory stored on the FEProm.
The second and third structures are the FEDirEntry and FEFileEntry structures. One of these structures is allocated for each directory and file. The structures are identical except that the FEFileEntry has extent location and extent length variables. The variable sibling points to the next sibling in the linked list of FEDirEntry and FEFileEntry structures at the same level in the directory hierarchy. The variables primary-- ptr and secondary-- ptr are fully described below.
Described below is a preferred method of a file system for a FEProm. The file system allows for directories to be added and deleted, and files to be created, extended, and modified. FIG. 4 shows a flow diagram for the routine that adds a directory to a storage device. The input parameters to this routine are the complete pathname of the new directory and attribute data for the new directory. The term attribute data as used below refers to the attribute, date, and time values. This routine will set the variable P to point to the parent directory and the variable C to point to the child directory. For example, the path name "\P\C" means that a directory "C" is to be created that is a subdirectory of "P," which is a subdirectory of the root directory. FIG. shows when "C" would be the first subdirectory of "P," and FIG. 6 shows when "C" would not be the first subdirectory of "P". Referring to FIGS. 5 and 6, the solid lines show the directory structure before "C" is added and the broken lines show the directory structure after "C" is added.
In block 401 of FIG. 4, the system locates directory "P" by following the path from the root directory and setting variable P to the address of "P" directory. In block 402, the system allocates a new directory entry of the record type FEDirEntry for directory "C." The system sets the variable C to the variable first-- unallocated and allocates the space by incrementing the variable first-- unallocated by the size of an FEDirEntry record. FIGS. 7A and 7B show the address space before allocation and after allocation of the FEDirEntry record, respectively. In block 403, the system sets the variables name, time, date, and attribute in the newly allocated record. In block 404, the system sets the status bit to indicate that the newly allocated entry is a directory entry, rather than a file entry.
In blocks 405 through 410, the system links the new directory entry into the old directory structure. In blocks 406 through 409, the system handles the situation where the new directory is not the first subdirectory of "P." In block 410, the system handles the situation where the new directory is the first subdirectory of "P." In block 405, if P-->primary-- ptr equals FNULL, then the "P" directory has no subdirectory and the system continues at block 410, else the "P" directory has or has had a subdirectory (discussed below), and the system continues at block 406. In block 410, the system sets P-->primary-- ptr equal to the variable C, the address of the newly allocated directory entry to effect the liking to the new directory and then the routine is done.
In block 406, the system sets the variable next-- ptr equal to P-->primary-- ptr. The variable next-- ptr contains the next directory in the chain of sibling subdirectories. In block 407, if next-- ptr-->sibling equals FNULL, then the end of the chain of siblings has been reached and the system continues at block 409, else the system continues at block 408. In block 408, the system sets next-- ptr equal to next-- ptr-->sibling, which advances next-- ptr to point to the next directory in the chain, and continues at block 407 to determine if the end of the chain has been reached. In block 409, the system sets next-- ptr>sibling equal to C, the address of the newly allocated directory record and then the routine is done.
FIG. 8 shows a flow diagram of the routine that adds a record into the file system for a new file. Since FEFileEntry records are simply leaf nodes of the hierarchical tree-structured file system, the routine that adds the FEFileEntry records is very similar to the routine for FEDirEntry records, which is Add Directory, shown in FIG. 4. The significant difference is that the status bit that indicates the record is a directory is not cleared as in block 404 of FIG. 4. Thus, the status bit indicates the record is a file record.
FIG. 9 shows a flow diagram of the routine that adds data to a newly created file. The routine is passed the complete pathname, the data to write, and the number of bytes to write. The routine allocates space in the FEProm, writes the data, and then updates the FEFileEntry record for the file. In block 901 and 902, the system allocates the space in the FEProm for the extent. In block 901, the system sets the pointer extent-- start equal to first-- unallocated. In block 902, the system increments first-- unallocated by the number of bytes to write. In block 903, the system writes the data to the FEProm at the location pointed to by extent-- start. In block 904, the system locates the FEFileEntry record for the file by tracing down the pathname and sets F to point to that record. In block 905, the system sets F-->extent-- location equal to extent-- start. In block 906, the system sets F-->extent-- length equal to the number of bytes to write and then the routine is done.
FIGS. 10A and 10B show a flow diagram of the routine to add data onto the end of a file. This routine is passed the complete pathname, the data to write, and the number of bytes to write. FIG. 11 shows a sample layout of the directory structure that contains the file "\L.dat" that is to be extended. The solid lines show the structure before the file is extended and the broken lines show the structure after the file is extended. Initially, the file "L.DAT" has a FEFileEntry record and a FEFileInfo record associated with it. Each of these records has a data extent, D1 or D2. The broken lines represent a FEFileInfo record with the data to be added to the file in extent D3.
Referring to FIGS. 10A and 10B in block 1001, the system allocates a new FEFileInfo record in the FEProm and sets the pointer FI to contain the address of that record. In block 1002, the system sets FI-->date, FI-->time, and FI-->attribute. In blocks 1003 and 1004, the system allocates space in the FEProm for the data that is to extend the file. In block 1003, the system sets the variable extent-- start equal to first-- unallocated. In block 1004, the system increments first-- unallocated by the number of bytes to write. In block 1005, the system writes the data to the FEProm starting at the location pointed to by extent-- start. In block 1006, the system locates the FEFileEntry record for the file to be extended and sets FE to point to that record. In a preferred embodiment, the system would locate the FEFileEntry record before allocating the new extent and FEFileInfo record to ensure that the file exists before any allocation is done.
In blocks 1007 through 1012, the system locates the last FEFileInfo record for the file to be extended. The system follows the primary-- ptr or the secondary-- ptr of the FEFileEntry record and the FEFileInfo records. A non-FNULL value in the secondary-- ptr field indicates that the record pointed to by the primary-- ptr has been superseded by the data in the record pointed to by the secondary-- ptr. In block 1007, the system sets pointer next-- ptr equal to FE, which is the address of the FEFileEntry record. In block 1008A, the system sets the pointer prev-- ptr equal to next-- ptr. When the last FEFileInfo record in the file is located, the pointer prev-- ptr will contain the address of that record. In block 1008B, the system sets the next-- to>indicate that the attributes, date, and time are superseded. This will ensure that the newly allocated FEFileInfo record will be the only record for the file with current attribute, date, and time data. In block 1009, if next-->secondary-- ptr equals FNULL, then the data in the record pointed to by the primary-- ptr has not been superseded and the system continues at block 1010, else the system continues at block 1011. In block 1010, the system sets next-- ptr equal to next-- ptr-->primary-- ptr to get the address of the next record in the linked list and continues at block 1012. In block 1011, the system sets next equal to next-- ptr-->secondary-- ptr to get the address of the next record in the linked list and continues at block 1012. In block 1012, if next-- ptr equals FNULL, then the end of the list has been reached and the system continues at block 1013, else the system continues at 1008A to process the next record in the list. In block 1013, the system sets prev-- ptr-->primary-- ptr equal to FI to effect the extending of the file and the routine is done.
FIG. 12 shows a flow diagram for the routine that updates the data in a file. The parameters for this routine are R, the address of the FEFileEntry or FEFileInfo block that is to have its associated extent modified; extent-- offset, the offset into the extent for the new data; new-- data, the new data; data-- length, the length of the new data. Since the FEProm is effectively a write once device, at least until everything is erased, an area where data is stored cannot be rewritten when an update to a file occurs. In a preferred embodiment, the updated data is written to a different area of the FEProm, as described below.
FIG. 13 shows a typical portion of the linked list of the FEFileInfo records for a file. The Update-- File routine will replace the data represented by the shaded area. FIG. 14 shows the structure of the linked list after the modified data has been written to the FEProm. Three FEFileInfo records, R1, R2, and R3, have been inserted into the linked list The entire extent is not rewritten, rather only the portion that actually changed is rewritten. The routine divides the extent into three sections, D1, D2, and D3. Sections D1 and D3 contain data that is not changed by the update, and section D2 contains the data that will change. Each section will have a corresponding FEFileInfo record. The FEFileInfo records R1, R2, and R3 are linked through their primary-- ptr. Also, the extent-- location field in R1 and R3 point to their corresponding extent sections and the extent length fields are set. However, a new extent has been allocated for the changed data corresponding to the new D2 section, which is pointed to by record R2. The secondary-- ptr of record R points to FEFileInfo R1 to indicate that the primnary-- ptr of R is suspended. The primary-- of FEFileInfo record R3 is set to the value contained in the primary-- ptr of FEFileInfo record R to complete the link.
In block 1201, the system allocates three FEFileInfo records and sets the pointers R1, R2, and R3 to contain the addresses. R1 is allocated with and R2 and R3 are allocated without the attribute data. In block 1202, the system sets R1-->time, R1-->date, and R1-->attributes and R2-->status and R3-->status to superseded. In block 1203 and 1204, the system allocates a record of data-- length for the new data In block 1203, the system sets the variable extent-- start equal to first-- unallocated. In block 1204, the system increments first-- unallocated by data-- length. In block 1205, the system writes new-- data to the FEProm starting at the address extent-- start.
In blocks 1206 through 1208, the system sets the data in FEFileInfo record R2. In block 1206, the system sets R2-->extent-- location equal to extent-- start. In block 1207, the system sets R1-->extent-- length equal to data-- length. In block 1208, the system sets R2-->primary-- ptr to R3.
In blocks 1209 through 1211, the system sets the data in FEFileInfo record R3. In block 1209, the system sets R3-->extent-- location equal to R-->extent-- location plus extent-- offset plus data-- length, which is the start address of section D3. In block 1210, the system sets R3-->exten-- length equal to R-->extent-- length. minus R3-->extent-- location. In block 1211, the system sets R3-->primry-- pointer equal to R-->primary-- ptr.
In blocks 1212 through 1214, the system sets the data in FEFileInfo record R1. In block 1212, the system sets R1-->extent-- location equal to R-->extent-- location. In block 1213, the system sets R-->extent-- length equal to extent-- offset. In block 1214, the system sets (R1-->primary-- otr to R2.
In block 1215, the system sets R-->secondary-- ptr equal to R1, which indicates that the primary-- ptr is superseded, and then the routine is done.
FIGS. 15 and 16 show the FEFileInfo list for a couple special cases of file updates. The routine for processing for these special cases is a subset of the routine needed for processing the general case, Update-- File, shown in FIG. 12. In FIG. 15, data starting at the beginning of an extent is updated. Section D1 contains the data at the beginning of the extent to be updated and section D2 contains the data at the end of the extent that is not updated. Only two new FEFileInfo records are needed. The first FEFileInfo record R1 points to the new data and the second FEFileInfo record R2 points to the old data. A similar situation occurs when data that ends on an extent boundary is updated as shown in FIG. 16.
FIG. 17 shows a linked list for FEFileInfo records when the updated data spans extent boundaries.
FIG. 18 shows a flow diagram of a routine that deletes a directory or file from the FEProm. This routine clears the exist/delete bit in the FEDirEntry. In block 1801, the system locates the directory or file to be deleted and sets the pointer D to contain the address of the directory or file. In block 1802, the system sets D-->status to indicate that the directory or file is deleted and the routine completes.
The name of a directory or file is changed by allocating a new FEDirEntry or FEFileEntry, respectively, and then setting the secondary-- ptr of the old entry to point the new entry. FIG. 20 shows the file entry for "D.DAT" in solid lines and the changes in broken lines when the name is changed to "B.DAT." The new entry points to the linked list of FEFileInfo entries, the directory structure, and the extent associated with the old entry.
FIG. 19 is a flow diagram of a preferred subroutine that implements the changing of a file name. (The subroutine for changing a directory is similar, except that there are no associated extents.) The input parameters to this routine are the pathname of the file and the new file name. In block 1901, the system searches through the directory structure and locates the file whose name is to be changed and sets the variable P to point to the FEFileEntry. In block 1902 and 1903, the system searches for the last FEFileEntry in the linked list of entries for the file. A file will have an entry for each name change In block 1902, if P-->secondary-- ptr equals FNULL, then P points to the end of the linked list and the system continues at block 1904, else P does not point to the end of the linked list and the system continues at block 1903. In block 1903, the system sets P equal to P-->secondary-- otr to walk through the linked list.
In block 1904, the system allocates a new FEFileEntry and sets the variable C to point to the entry. In block 1905, the system set C-->name equal to the new file name. In block 1906, the system sets C-->sibling equal to P-->sibling to link the entry into the directory hierarchy. In blocks 1907 and 1908, the system sets C-->extent-- location and C-->extent-- length equal to P-->extent-- location and P-->extent-- length, respectively, to link the new entry to the extent. In block 1909, the system sets C-->primry-- ptr equal to P-->primary-- ptr to link the new entry to the list of extents. In block 1910, the system sets P-->secondary-- ptr equal to C to complete the replacement of the old entry and the routine completes.
The attribute data associated with a file are changed by adding a new FEFileInfo entry onto the linked list of FEFileInfo entries. All FEFileInfo entries except the last are set to indicate that the attribute data have been superseded. FIG. 22 shows the linked list arrangement before the attribute data change in solid lines and after the attribute data the change in broken lines. No extent is associated with the FEFileInfo entry that is added as a result of an attribute data change.
FIGS. 21A and 21B show a flow diagram of a routine that changes the attribute data of a file. The input parameters are the pathname and the attribute data. In block 2101, the system searches through the directory structure to locate the file and sets the variable P to point to the FEFileEntry. In block 2102 and 2103, the system searches for the last FEFileEntry in the linked list of entries for the file. A file will have an entry for each name change. In block 2102, if P-->secondary-- ptr equals FNULL, then P points to the end of the linked list and the system continues at block 2104, else P does not point to the end of the linked list and the system continues at block 2103. In block 2103, the system sets P equal to P-->secondary-- ptr to walk through the linked list.
In block 2104, the system sets the variable C equal to P-->primary-- ptr, which points to the linked list of FEFileInfo entries for the file. In blocks 2105 through 2110, the system searches through the FEFileInfo entries for the last entry. If a secondary-- ptr is set, the system follows that path, otherwise it follows the primary-- ptr. If both primary-- ptr and secondary-- ptr are equal to FNULL, then the system has located the end of the linked list In block 2105, if C-->secondary-- ptr equals FNULL, then the system continues at block 2108, else the system continues at block 2106. In block 2106, the system sets C-->status to indicate that the attribute data are superseded. The new FEFileInfo entry will contain the new attribute data. In block 2107, the system sets C equal C-->secondary-- ptr to traverse the linked list and the system loops to 2105.
In block 2108, if C-->primary-- ptr equals FNULL, then C points to the last FEFileInfo record in the list and the system continues at block 2111, else the system continues at block 2109. In block 2109, the system sets C-->status to indicate that the attribute data are superseded. The new FEFileInfo entry will contain the new attribute data. In block 2110, the system sets C equal C-->primary-- ptr to traverse the linked list and the system loops to 2105.
In block 2111, the system allocates a new FEFileEntry and sets the variable R to point to the entry. In block 2112, the systems sets the attribute data for the new file entry. In block 2113, the system sets C-->primary-- ptr equals R to link the new entry with the other FEFileInfo entries and the routine completes.
In an alternate preferred embodiment, the FEFileEntry records and the FEFileInfo records are allocated after the space for extent is allocated. Storing in this manner has two advantages. First, it ensures that the allocated space will never end in an FNULL. Second, several writes can be combined into one large extent. The combining of the writes can occur up to the point at which FEDirEntry, FEFileEntry, or a FEFileInfo (for a different file) are to be added to the FEProm. At that point, the combined FEFileInfo record could be written out.
Although the present invention has been described in terms of preferred embodiment, it is not intended that the invention be limited to this embodiment. Modifications within the spirit of the invention will be apparent to those skilled in the art. The scope of the present invention is defined by the claims that follow.

Claims (31)

We claim:
1. A method of updating data stored on a computer memory file storage device with new data, the memory containing records of data, each record having a primary pointer and a secondary pointer, the records stored as a linked list that is linked by the primary pointers, the method comprising the steps of:
locating a record that contains data to be updated, the record being contained in the memory comprising a plurality of bits such that once a bit is changed from a predefined bit value to another bit value the changed bit cannot be individually changed back to the predefined bit value, the data including bits that have been changed from the predefined bit value to the other bit value, the secondary pointer of the located record having each bit set to the predefined bit value;
allocating a record to contain the new data, the record being allocated in the memory, each bit of the allocated record being set to the predefined bit value;
writing the new data to the allocated record; and
setting the secondary pointer in the located record to point to the allocated record to indicate that the new data in the allocated record is an update of the data in the located record by changing at least one bit of the secondary pointer from the predefined bit value to the other bit value
wherein the step of locating a record includes the steps of:
(a) selecting a record at which to start a traversal of the linked list;
(b) reading the secondary pointer for the selected record;
(c) if each bit of the read secondary pointer is set to the predefined bit value, then selecting the record pointed to by the primary pointer of the selected record;
(d) if . .each.!. .Iadd.at least one .Iaddend.bit of the read secondary pointer is not set to the predefined bit value, then selecting the record pointed to by the secondary pointer of the selected record; and
(e) repeating steps (b) to (d), until the selected record contains the data to be updated.
2. The method of claim 1 including the additional step of setting the primary pointer in the allocated record equal to the primary pointer of the located record.
3. The method of claim 1 or 2 wherein the file storage device is a flash, erasable programmable read only memory.
4. The method of claim 1 wherein the file storage device is logically a stack device, the stack having a top, and the allocated records are allocated on the top of the stack.
5. A computer file storage system for organizing files based on a hierarchical directory structure, the directory structure having a plurality of directory entries, the system comprising:
a computer having a memory for storing directory entries, the memory comprising a plurality of bits such that once a bit is changed from a predefined bit value to another bit value the changed bit cannot be individually changed back to the predefined bit value;
means for allocating a portion of the memory for storing a directory entry, the directory entry having a primary pointer, a secondary pointer, and a sibling pointer, the pointers having a plurality of bits initially being set to the predefined bit value;
means for storing directory data in the directory entry;
means for setting the sibling pointer of the directory entry to point to another directory entry at the same level in the directory structure to form a linked list of sibling directory entries;
means for setting the primary pointer of the directory entry to point to another directory entry at the next level lower in the directory structure;
means for determining whether each bit of the secondary pointer of the directory entry is set to the predefined bit value to indicate that the directory data of the directory entry has superseded; and
means for setting the secondary pointer of the directory entry to point to a superseding directory entry, the superseding directory entry to contain updated data for the directory entry by changing at least one bit of the secondary pointer from the predefined bit value to the other bit value.
6. The computer file storage system of claim 5 further comprising:
means for setting the primary pointer of the superseding directory entry equal to the primary pointer of the directory entry; and
mean for setting the sibling pointer of the superseding directory entry equal to the sibling pointer of the directory entry.
7. The computer file storage system of claim 5 further comprising:
means for allocating a portion of the memory for storing a file entry, the file entry to contain information relating to a file; and
means for setting the primary pointer of the directory entry to point to the file entry.
8. The computer file storage system of claim 7 wherein the file entry contains a primary pointer, a secondary pointer, and a sibling pointer, the file entry pointers having a plurality of bits initially being set to the predefined bit value, including:
means for setting the sibling pointer of the file entry to point to another file entry to form a linked list of file entries; and
means for setting the secondary pointer of the file entry to point to a superseding file entry, the superseding file entry to contain updated data for the file entry.
9. The computer file storage system of claim 8 further comprising:
means for setting the primary pointer of the superseding file entry equal to the primary pointer of the file entry; and
means for setting the sibling pointer of the superseding file entry equal to the sibling pointer of the file entry.
10. The computer file storage system of claim 7 further comprising:
means for allocating a portion of the memory for storing a file information entry, the file information entry to contain information relating to a file extent; and
means for setting the primary pointer of the file entry to point to the file information entry.
11. The computer file storage system of claim 10 wherein the file information entry contains a primary pointer and secondary pointer, the file information entry pointers having a plurality of bits initially being set to the predefined bit value, further comprising:
means for setting the primary pointer of the file information entry to point to another file information entry associated with the same file to form a linked list of file information entries for that same file; and
means for setting the secondary pointer of the file information entry to point to a superseding file information entry, the superseding file information entry to contain updated data for the file information entry.
12. The computer file storage system of claim 11 further comprising:
means for setting the primary pointer of the superseding file information entry equal to the primary pointer of the file information entry.
13. The computer file storage system of claim 5, 6, 7, 8, 9, 10, 11, or 12 wherein the memory is a flash, erasable, programmable read-only memory.
14. A computer file storage system for storing files, the system comprising:
a computer having a memory for storing the files, the memory comprising a plurality of bits such that once a bit is changed from a . .predetermined.!. .Iadd.predefined .Iaddend.bit value to another bit value the changed bit cannot be individually changed back to the predefined bit value;
means for allocating a portion of the memory for storing a file entry, the file entry to contain information relating to a file and containing a primary pointer, a secondary pointer, and a sibling pointer, the information and pointers having a plurality of bits initially being set to the predefined bit value;
means for storing information relating to the associated file in the file entry;
means for setting the sibling pointer of the file entry to point to another file entry to form a linked list of file entries;
means for determining whether each bit of the secondary pointer of the file entry is set to the predefined bit value to indicate that the information of the file entry has not been superseded; and
means for setting the secondary pointer of the file entry to point to a superseding file entry, the superseding file entry to contain updated information for the file entry by changing at least one bit of the secondary pointer from the predefined bit value to the other bit value.
15. The computer file storage system of claim 14 further comprising:
means for setting the primary pointer of the superseding file entry equal to the primary pointer of the file entry; and
means for setting the sibling pointer of the superseding file entry equal to the sibling pointer of the file entry.
16. The computer file storage system of claim 14 including:
means for allocating a portion of the memory for storing a file information entry, the file information entry to contain information relating to a file extent of a file, the file information entry containing a primary pointer and a secondary pointer, each of the file information entry pointers having a plurality of bits initially being set to the predefined bit value;
means for setting the primary pointer of the file entry to point to the file information entry;
means for setting the primary pointer of a file information entry to point to another file information entry associated with the same file to form a linked list of file information entries for the same file; and
means for setting the secondary pointer of the file information entry to point to a superseding file information entry, the superseding file information entry to contain updated information for the file information entry.
17. The computer file storage system of claim 16 further comprising:
means for setting the primary pointer of the superseding file information entry equal to the primary pointer of the file information entry.
18. The computer file storage system of claim 14, 15, 16, or 17 wherein the memory is a flash, erasable, programmable read-only memory.
19. A method of updating data stored on a computer memory device with new data, the memory device containing records of data, each record having a secondary pointer, the method comprising the steps of:
locating a record that contains data to be updated, the record being contained in the memory device comprising a plurality of bits such that once a bit is changed from a predefined bit value to another bit value the changed bit cannot be individually changed back to the predefined bit value, the data including bits that have been changed from the predefined bit value to the other bit value, the secondary pointer of the located record having each bit set to the predefined bit value;
allocating a record to contain the new data, the record being allocated in the memory, each bit of the allocated record being set to the predefined bit values;
writing the new data to the allocated record; and
setting the secondary pointer in the located record to point to the allocated record to indicate that the new data in the allocated record is an update of the data in the located record by changing at least one bit of the secondary pointer from the predefined bit value to the other bit value
wherein the step of locating a record includes the steps of:
(a) selecting a record at which to start a traversal of the linked list;
(b) reading the secondary pointer for the selected record;
(c) if each bit of the read secondary pointer is set to the predefined bit value, then selecting the record pointed to by the primary pointer of the selected record;
(d) if . .each.!. .Iadd.at least one .Iaddend.bit of the read secondary pointer is not set to the predefined bit value, then selecting the record pointed to by the secondary pointer of the selected record; and
(e) repeating steps (b) to (d), until the selected record contains the data to be updated.
20. The method of claim 19 wherein the step of setting the secondary pointer includes setting a flag in the located record to indicate at the secondary pointer has been changed from the a predefined bit value.
21. The method of claim 19 or 20 wherein the computer memory device is a flash, erasable, programmable read-only memory.
22. The method of claim 19 wherein the step of locating a record includes determining an address of a first unallocated portion in the memory.
23. The method of claim 22 wherein the device has a plurality of locations, each location identified by an address, the addresses being sequential, the device having a beginning location and an ending location, the device having an allocated portion of contiguous locations and an unallocated portion of contiguous locations, the allocated portion being positioned starting at the beginning address, the unallocated portion being positioned ending at the ending address, each bit of each location in the allocated portion being set to the predefined bit value, and wherein the step for determining an address of a first unallocated location includes the steps of:
(a) setting a search pointer equal to the address of the ending location;
(b) retrieving data stored at the location pointed to by the search pointer;
(c) comparing each bit of the retrieved data with the predefined bit value;
(d) if each bit of the retrieved data is equal to the predefined bit value, adjusting the search pointer to point to the next contiguous location;
(e) repeating steps (b), (c), and (d) until at least one bit of the retrieved data is not equal to the predefined bit value; and
(f) if at least one bit of the retrieved data is not equal to the predefined bit value, setting the address of the first unallocated location equal to the address of the last location from which each bit of the retrieved data was equal to the predefined bit value.
24. The method of claim 23 wherein the allocated portion of contiguous locations has a last location, including the step of:
ensuring that at least one bit of the last location in the allocated portion of contiguous locations contains a bit value other than the predefined bit value.
25. The method of claim 22, 23, or 24 wherein the memory device is a flash, erasable, programmable read-only memory.
26. A method for determining an address of a first unallocated location in a memory device, the device having a plurality of locations, each location identified by an associated address, the addresses being sequential, the device having a beginning location and a ending location, the device having an allocated portion of contiguous locations and an unallocated portion of contiguous locations, the allocated portion being positioned starting at the beginning address, the unallocated portion being positioned ending at the ending address, each bit of the unallocated portion being set to a predefined value, the method comprising the steps of:
(a) setting a search pointer equal to the address of the ending location;
(b) retrieving the bits stored at the location pointed to by the search pointer, the location comprising a plurality of bits such that once a bit is changed from the predefined value to another value the changed bit cannot be individually changed back to the predefined value;
(c) comparing the retrieved bits with the predefined value;
(d) if each of the retrieved bits is equal to the predefined value, adjusting the search pointer to point to the next contiguous location;
(e) repeating steps (b), (c), and (d) until at least one of the retrieved bits is not equal to the predefined value; and
(f) if at least one of the retrieved bits is not equal to the predefined value, setting the address of the first unallocated location equal to the address of the last location from which each of the retrieved bits was equal to the predefined value.
27. The method of claim 26, wherein the allocated portion of contiguous locations has a last location, including the additional step of:
ensuring that at least one bit of the last location in the allocated portion of the contiguous locations contains a value other than the predefined value.
28. The method of claim 26 or 27 wherein the memory device is a flash, erasable, programmable read-only memory.
29. A method of updating a logically contiguous set of data with updated data, the data comprising a plurality of extents, each extent comprising a logically contiguous subset of the set of data, each extent having an associated extent header, the extent header having a primary pointer, a secondary pointer, and an extent pointer, the primary pointers linking the extent headers in a linked list, the extent pointers pointing to the extent associated with the header, the method comprising the steps of:
locating an extent header associated with an extent to be updated, the located extent header comprising a plurality of bits such that once a bit is changed from a predefined bit value to another bit value the changed bit cannot be individually changed back to the predefined bit value, the secondary bit pointer of the located extent header having each bit set to the predefined bit value;
allocating an extent header, the allocated extent header comprising a plurality of bits such that once a bit is changed from the predefined bit value to another bit value the changed bit cannot be individually changed back to the predefined bit value, each bit of the allocated extent header being set to the predefined bit value;
setting the secondary pointer in the located extent header to point to the allocated extent header by changing at least one bit of the secondary pointer from the predefined bit value to the other bit value;
setting the primary pointer in the allocated extent header equal to the primary pointer of the located extent header by changing at least one bit of the primary pointer from the predefined bit value to the other bit value;
allocating an extent to store the updated data;
storing the updated data in the allocated extent; and
setting the extent pointer in the allocated extent header to point to the allocated extent by changing at least one bit of the extent pointer from the predefined bit value to the other bit value.
30. The method of claim 29 comprising the additional steps of:
setting the primary pointer in the allocated extent header to point to another allocated extent header, when updating only a portion of the data in the extent to be updated; and
setting the extent pointer in the other allocated extent to point to a portion of data in the extent to be updated, wherein the portion of data is not to be updated.
31. The method of claim 29 or 30 wherein the memory device is a flash, erasable, programmable read-only memory.
US08/531,460 1989-10-31 1995-09-21 Method and system for traversing linked list record based upon write-once predetermined bit value of secondary pointers Expired - Lifetime USRE35881E (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US08/531,460 USRE35881E (en) 1989-10-31 1995-09-21 Method and system for traversing linked list record based upon write-once predetermined bit value of secondary pointers

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US07/430,746 US5247658A (en) 1989-10-31 1989-10-31 Method and system for traversing linked list record based upon write-once predetermined bit value of secondary pointers
US08/531,460 USRE35881E (en) 1989-10-31 1995-09-21 Method and system for traversing linked list record based upon write-once predetermined bit value of secondary pointers

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US07/430,746 Reissue US5247658A (en) 1989-10-31 1989-10-31 Method and system for traversing linked list record based upon write-once predetermined bit value of secondary pointers

Publications (1)

Publication Number Publication Date
USRE35881E true USRE35881E (en) 1998-08-25

Family

ID=23708852

Family Applications (3)

Application Number Title Priority Date Filing Date
US07/430,746 Ceased US5247658A (en) 1989-10-31 1989-10-31 Method and system for traversing linked list record based upon write-once predetermined bit value of secondary pointers
US08/063,496 Expired - Lifetime US5392427A (en) 1989-10-31 1993-05-18 System for updating data stored on a flash-erasable, programmable, read-only memory (FEPROM) based upon predetermined bit value of indicating pointers
US08/531,460 Expired - Lifetime USRE35881E (en) 1989-10-31 1995-09-21 Method and system for traversing linked list record based upon write-once predetermined bit value of secondary pointers

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US07/430,746 Ceased US5247658A (en) 1989-10-31 1989-10-31 Method and system for traversing linked list record based upon write-once predetermined bit value of secondary pointers
US08/063,496 Expired - Lifetime US5392427A (en) 1989-10-31 1993-05-18 System for updating data stored on a flash-erasable, programmable, read-only memory (FEPROM) based upon predetermined bit value of indicating pointers

Country Status (1)

Country Link
US (3) US5247658A (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010026503A1 (en) * 2000-02-29 2001-10-04 Hirofumi Todo Recording apparatus, recording method, and record medium
US6404444B1 (en) * 1999-05-13 2002-06-11 International Business Machines Corporation Method and apparatus for displaying and controlling allocation of resource in a data processing system
US6973519B1 (en) 2003-06-03 2005-12-06 Lexar Media, Inc. Card identification compatibility
US20060064432A1 (en) * 2004-09-22 2006-03-23 Pettovello Primo M Mtree an Xpath multi-axis structure threaded index
US7162602B2 (en) 2004-03-16 2007-01-09 Hitachi, Ltd. More granular and more efficient write protection for disk volumes
US7681057B2 (en) 2001-09-28 2010-03-16 Lexar Media, Inc. Power management of non-volatile memory systems
US7725628B1 (en) 2004-04-20 2010-05-25 Lexar Media, Inc. Direct secondary device interface by a host
US7734862B2 (en) 2000-07-21 2010-06-08 Lexar Media, Inc. Block management for mass storage
US7743290B2 (en) 2004-08-27 2010-06-22 Lexar Media, Inc. Status of overall health of nonvolatile memory
US7774576B2 (en) 1995-07-31 2010-08-10 Lexar Media, Inc. Direct logical block addressing flash memory mass storage architecture
US7788447B2 (en) 1999-11-14 2010-08-31 Netac Technology Co., Ltd. Electronic flash memory external storage method and device
US7865659B2 (en) 2004-04-30 2011-01-04 Micron Technology, Inc. Removable storage device
US7908426B2 (en) 1995-07-31 2011-03-15 Lexar Media, Inc. Moving sectors within a block of information in a flash memory mass storage architecture
US7917709B2 (en) 2001-09-28 2011-03-29 Lexar Media, Inc. Memory system for data storage and retrieval
US7944762B2 (en) 2001-09-28 2011-05-17 Micron Technology, Inc. Non-volatile memory control
US7949822B2 (en) 2004-08-27 2011-05-24 Micron Technology, Inc. Storage capacity status
USRE42397E1 (en) 1999-04-05 2011-05-24 Sandisk Il Ltd. Architecture for a universal serial bus-based PC flash disk
US8078797B2 (en) 1995-07-31 2011-12-13 Micron Technology, Inc. Increasing the memory performance of flash memory devices by writing sectors simultaneously to multiple flash memory devices
US20120005528A1 (en) * 2010-07-02 2012-01-05 International Business Machines Corporation Data set index record preservation
US8166074B2 (en) 2005-11-14 2012-04-24 Pettovello Primo M Index data structure for a peer-to-peer network
US8166488B2 (en) 2002-02-22 2012-04-24 Micron Technology, Inc. Methods of directly accessing a mass storage data device
US20120102282A1 (en) * 2010-10-22 2012-04-26 Wade Richards Variable length data protected by seqlock
US8171203B2 (en) 1995-07-31 2012-05-01 Micron Technology, Inc. Faster write operations to nonvolatile memory using FSInfo sector manipulation
US8386695B2 (en) 2001-09-28 2013-02-26 Micron Technology, Inc. Methods and apparatus for writing data to non-volatile memory
US8631028B1 (en) 2009-10-29 2014-01-14 Primo M. Pettovello XPath query processing improvements

Families Citing this family (103)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5247658A (en) * 1989-10-31 1993-09-21 Microsoft Corporation Method and system for traversing linked list record based upon write-once predetermined bit value of secondary pointers
JPH04186447A (en) * 1990-11-21 1992-07-03 Canon Inc Directory management system
GB2251324B (en) * 1990-12-31 1995-05-10 Intel Corp File structure for a non-volatile semiconductor memory
GB2251323B (en) * 1990-12-31 1994-10-12 Intel Corp Disk emulation for a non-volatile semiconductor memory
US5357629A (en) * 1991-09-16 1994-10-18 Pitney Bowes Inc. System for recording structured read only data table revisions and forming a directory to the latest revisions of table elements
US6256642B1 (en) * 1992-01-29 2001-07-03 Microsoft Corporation Method and system for file system management using a flash-erasable, programmable, read-only memory
US5493607A (en) * 1992-04-21 1996-02-20 Boston Technology Multi-system network addressing
JPH05314483A (en) * 1992-05-11 1993-11-26 Olympus Optical Co Ltd Recording method of information
FR2696259A1 (en) * 1992-09-30 1994-04-01 Apple Computer Organisation of tasks and modules for execution in processor - uses context switching between tasks that are made up of modules linked to their resources and to following tasks
US5715424A (en) * 1992-12-10 1998-02-03 International Business Machines Corporation Apparatus and method for writing data onto rewritable optical media
US5787444A (en) * 1993-03-15 1998-07-28 International Business Machines Corp. Method and apparatus for maintaining revision contol of a set of objects within a data processing system
DE69429378T2 (en) * 1993-04-01 2002-05-23 Microsoft Corp., Redmond Common memory area for long and short file names
US6286013B1 (en) 1993-04-01 2001-09-04 Microsoft Corporation Method and system for providing a common name space for long and short file names in an operating system
US5613105A (en) * 1993-06-30 1997-03-18 Microsoft Corporation Efficient storage of objects in a file system
US5682497A (en) * 1993-09-28 1997-10-28 Intel Corporation Managing file structures for a flash memory file system in a computer
US5568639A (en) * 1993-11-24 1996-10-22 Menai Corporation Method and apparatus for providing an object-oriented file structuring system on a computer
US5568634A (en) * 1994-04-21 1996-10-22 Gemplus Card International Method of writing in a non-volatile memory, notably in a memory card employing memory allocation strategies on size and occupancy basis
US5574905A (en) * 1994-05-26 1996-11-12 International Business Machines Corporation Method and apparatus for multimedia editing and data recovery
US5765175A (en) * 1994-08-26 1998-06-09 Intel Corporation System and method for removing deleted entries in file systems based on write-once or erase-slowly media
US5590320A (en) * 1994-09-14 1996-12-31 Smart Storage, Inc. Computer file directory system
US5752250A (en) * 1994-12-02 1998-05-12 Fujitsu Limited Instance updating method and apparatus therefor
US5579516A (en) * 1994-12-15 1996-11-26 Hewlett-Packard Company Method for storing data files on a multiple volume media set
US5644736A (en) * 1995-05-25 1997-07-01 International Business Machines Corporation System and method for selecting components of a hierarchical file structure
JPH08328762A (en) * 1995-06-06 1996-12-13 Mitsubishi Electric Corp Semiconductor disk device and memory management method therefor
US5987478A (en) * 1995-10-31 1999-11-16 Intel Corporation Virtual small block file manager for flash memory array
US6304893B1 (en) 1996-07-01 2001-10-16 Sun Microsystems, Inc. Object-oriented system, method and article of manufacture for a client-server event driven message framework in an interprise computing framework system
US6266709B1 (en) 1996-07-01 2001-07-24 Sun Microsystems, Inc. Object-oriented system, method and article of manufacture for a client-server failure reporting process
US6434598B1 (en) 1996-07-01 2002-08-13 Sun Microsystems, Inc. Object-oriented system, method and article of manufacture for a client-server graphical user interface (#9) framework in an interprise computing framework system
US5987245A (en) * 1996-07-01 1999-11-16 Sun Microsystems, Inc. Object-oriented system, method and article of manufacture (#12) for a client-server state machine framework
US6038590A (en) * 1996-07-01 2000-03-14 Sun Microsystems, Inc. Object-oriented system, method and article of manufacture for a client-server state machine in an interprise computing framework system
US6272555B1 (en) 1996-07-01 2001-08-07 Sun Microsystems, Inc. Object-oriented system, method and article of manufacture for a client-server-centric interprise computing framework system
US6424991B1 (en) 1996-07-01 2002-07-23 Sun Microsystems, Inc. Object-oriented system, method and article of manufacture for a client-server communication framework
US5848246A (en) * 1996-07-01 1998-12-08 Sun Microsystems, Inc. Object-oriented system, method and article of manufacture for a client-server session manager in an interprise computing framework system
US5999972A (en) * 1996-07-01 1999-12-07 Sun Microsystems, Inc. System, method and article of manufacture for a distributed computer system framework
KR980013092A (en) 1996-07-29 1998-04-30 김광호 File management apparatus and method of exchange system
KR100260028B1 (en) * 1996-08-13 2000-06-15 윤종용 Data recovery method in a file system
US5960452A (en) * 1996-12-23 1999-09-28 Symantec Corporation Optimizing access to multiplexed data streams on a computer system with limited memory
US6115716A (en) * 1997-03-14 2000-09-05 Nokia Telecommunications Oy Method for implementing an associative memory based on a digital trie structure
US7313581B1 (en) * 1999-04-29 2007-12-25 International Business Machines Corporation Method for deferred deletion of entries for a directory service backing store
US7418435B1 (en) * 1999-08-05 2008-08-26 Oracle International Corporation Multi-model access to data
US6578054B1 (en) * 1999-10-04 2003-06-10 Microsoft Corporation Method and system for supporting off-line mode of operation and synchronization using resource state information
JP2003196142A (en) * 2001-12-25 2003-07-11 Sony Corp Write-once type memory device and file management method
US6909910B2 (en) 2002-02-01 2005-06-21 Microsoft Corporation Method and system for managing changes to a contact database
US7627585B2 (en) * 2002-12-02 2009-12-01 Sap Ag Data structure mapping and packaging
US8694510B2 (en) 2003-09-04 2014-04-08 Oracle International Corporation Indexing XML documents efficiently
US8229932B2 (en) 2003-09-04 2012-07-24 Oracle International Corporation Storing XML documents efficiently in an RDBMS
US7644376B2 (en) * 2003-10-23 2010-01-05 Microsoft Corporation Flexible architecture for notifying applications of state changes
US7930277B2 (en) 2004-04-21 2011-04-19 Oracle International Corporation Cost-based optimizer for an XML data repository within a database
US7730114B2 (en) * 2004-11-12 2010-06-01 Microsoft Corporation Computer file system
US7873596B2 (en) * 2006-05-23 2011-01-18 Microsoft Corporation Extending cluster allocations in an extensible file system
US8606830B2 (en) 2004-12-17 2013-12-10 Microsoft Corporation Contiguous file allocation in an extensible file system
US9639554B2 (en) 2004-12-17 2017-05-02 Microsoft Technology Licensing, Llc Extensible file system
US8321439B2 (en) * 2004-12-17 2012-11-27 Microsoft Corporation Quick filename lookup using name hash
US7509474B2 (en) * 2005-06-08 2009-03-24 Micron Technology, Inc. Robust index storage for non-volatile memory
US7516422B2 (en) * 2005-07-21 2009-04-07 International Business Machines Corporation Graphical display of hierarchical hardlinks to files in a file system
US7571275B2 (en) * 2005-08-31 2009-08-04 Hamilton Sundstrand Corporation Flash real-time operating system for small embedded applications
US8073841B2 (en) 2005-10-07 2011-12-06 Oracle International Corporation Optimizing correlated XML extracts
US7761432B2 (en) * 2005-11-04 2010-07-20 Oracle America, Inc. Inheritable file system properties
US20070106700A1 (en) * 2005-11-04 2007-05-10 Sun Microsystems, Inc. Hierarchical file system naming
US8949455B2 (en) 2005-11-21 2015-02-03 Oracle International Corporation Path-caching mechanism to improve performance of path-related operations in a repository
US7797310B2 (en) 2006-10-16 2010-09-14 Oracle International Corporation Technique to estimate the cost of streaming evaluation of XPaths
US20080140724A1 (en) 2006-12-06 2008-06-12 David Flynn Apparatus, system, and method for servicing object requests within a storage controller
US9104599B2 (en) 2007-12-06 2015-08-11 Intelligent Intellectual Property Holdings 2 Llc Apparatus, system, and method for destaging cached data
US8489817B2 (en) 2007-12-06 2013-07-16 Fusion-Io, Inc. Apparatus, system, and method for caching data
US8935302B2 (en) 2006-12-06 2015-01-13 Intelligent Intellectual Property Holdings 2 Llc Apparatus, system, and method for data block usage information synchronization for a non-volatile storage volume
US8706968B2 (en) * 2007-12-06 2014-04-22 Fusion-Io, Inc. Apparatus, system, and method for redundant write caching
US8443134B2 (en) * 2006-12-06 2013-05-14 Fusion-Io, Inc. Apparatus, system, and method for graceful cache device degradation
US8719501B2 (en) 2009-09-08 2014-05-06 Fusion-Io Apparatus, system, and method for caching data on a solid-state storage device
US9519540B2 (en) 2007-12-06 2016-12-13 Sandisk Technologies Llc Apparatus, system, and method for destaging cached data
US7836226B2 (en) 2007-12-06 2010-11-16 Fusion-Io, Inc. Apparatus, system, and method for coordinating storage requests in a multi-processor/multi-thread environment
CN101965597B (en) * 2008-03-10 2014-08-06 Nxp股份有限公司 Method and devices for installing and retrieving linked MIFARE applications
US7958112B2 (en) 2008-08-08 2011-06-07 Oracle International Corporation Interleaving query transformations for XML indexes
WO2011031903A2 (en) * 2009-09-09 2011-03-17 Fusion-Io, Inc. Apparatus, system, and method for allocating storage
US9122579B2 (en) 2010-01-06 2015-09-01 Intelligent Intellectual Property Holdings 2 Llc Apparatus, system, and method for a storage layer
US9396104B1 (en) 2010-03-22 2016-07-19 Seagate Technology, Llc Accessing compressed data of varying-sized quanta in non-volatile memory
WO2012083308A2 (en) 2010-12-17 2012-06-21 Fusion-Io, Inc. Apparatus, system, and method for persistent data management on a non-volatile storage media
WO2012106362A2 (en) 2011-01-31 2012-08-09 Fusion-Io, Inc. Apparatus, system, and method for managing eviction of data
US9003104B2 (en) 2011-02-15 2015-04-07 Intelligent Intellectual Property Holdings 2 Llc Systems and methods for a file-level cache
US9201677B2 (en) 2011-05-23 2015-12-01 Intelligent Intellectual Property Holdings 2 Llc Managing data input/output operations
US8874823B2 (en) 2011-02-15 2014-10-28 Intellectual Property Holdings 2 Llc Systems and methods for managing data input/output operations
US9141527B2 (en) 2011-02-25 2015-09-22 Intelligent Intellectual Property Holdings 2 Llc Managing cache pools
WO2012129191A2 (en) 2011-03-18 2012-09-27 Fusion-Io, Inc. Logical interfaces for contextual storage
US9563555B2 (en) 2011-03-18 2017-02-07 Sandisk Technologies Llc Systems and methods for storage allocation
US9274937B2 (en) 2011-12-22 2016-03-01 Longitude Enterprise Flash S.A.R.L. Systems, methods, and interfaces for vector input/output operations
US10102117B2 (en) 2012-01-12 2018-10-16 Sandisk Technologies Llc Systems and methods for cache and storage device coordination
US9251052B2 (en) 2012-01-12 2016-02-02 Intelligent Intellectual Property Holdings 2 Llc Systems and methods for profiling a non-volatile cache having a logical-to-physical translation layer
US9767032B2 (en) 2012-01-12 2017-09-19 Sandisk Technologies Llc Systems and methods for cache endurance
US9251086B2 (en) 2012-01-24 2016-02-02 SanDisk Technologies, Inc. Apparatus, system, and method for managing a cache
US9116812B2 (en) 2012-01-27 2015-08-25 Intelligent Intellectual Property Holdings 2 Llc Systems and methods for a de-duplication cache
US10019353B2 (en) 2012-03-02 2018-07-10 Longitude Enterprise Flash S.A.R.L. Systems and methods for referencing data on a storage medium
US9612966B2 (en) 2012-07-03 2017-04-04 Sandisk Technologies Llc Systems, methods and apparatus for a virtual machine cache
US10339056B2 (en) 2012-07-03 2019-07-02 Sandisk Technologies Llc Systems, methods and apparatus for cache transfers
US10346095B2 (en) 2012-08-31 2019-07-09 Sandisk Technologies, Llc Systems, methods, and interfaces for adaptive cache persistence
US10509776B2 (en) 2012-09-24 2019-12-17 Sandisk Technologies Llc Time sequence data management
US10318495B2 (en) 2012-09-24 2019-06-11 Sandisk Technologies Llc Snapshots for a non-volatile device
US9842053B2 (en) 2013-03-15 2017-12-12 Sandisk Technologies Llc Systems and methods for persistent cache logging
US10102144B2 (en) 2013-04-16 2018-10-16 Sandisk Technologies Llc Systems, methods and interfaces for data virtualization
US10558561B2 (en) 2013-04-16 2020-02-11 Sandisk Technologies Llc Systems and methods for storage metadata management
US9842128B2 (en) 2013-08-01 2017-12-12 Sandisk Technologies Llc Systems and methods for atomic storage operations
US10019320B2 (en) 2013-10-18 2018-07-10 Sandisk Technologies Llc Systems and methods for distributed atomic storage operations
US10073630B2 (en) 2013-11-08 2018-09-11 Sandisk Technologies Llc Systems and methods for log coordination
US10331457B2 (en) * 2014-01-22 2019-06-25 Hewlett-Packard Development Company, L.P. Byte-addressable non-volatile read-write main memory partitioned into regions including metadata region
US9946607B2 (en) 2015-03-04 2018-04-17 Sandisk Technologies Llc Systems and methods for storage error management

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4408273A (en) * 1980-05-27 1983-10-04 International Business Machines Corporation Method and means for cataloging data sets using dual keyed data sets and direct pointers
US4507752A (en) * 1983-02-22 1985-03-26 International Business Machines Corporation In-place index compression
US4584644A (en) * 1981-03-16 1986-04-22 International Business Machines Corp. Method of controlling use of resources in a data processing system by at least two processes
US4606002A (en) * 1983-05-02 1986-08-12 Wang Laboratories, Inc. B-tree structured data base using sparse array bit maps to store inverted lists
US4630234A (en) * 1983-04-11 1986-12-16 Gti Corporation Linked list search processor
US4704678A (en) * 1982-11-26 1987-11-03 Inmos Limited Function set for a microcomputer
US4953080A (en) * 1988-04-25 1990-08-28 Hewlett-Packard Company Object management facility for maintaining data in a computer system
US4953122A (en) * 1986-10-31 1990-08-28 Laserdrive Ltd. Pseudo-erasable and rewritable write-once optical disk memory system
US4989132A (en) * 1988-10-24 1991-01-29 Eastman Kodak Company Object-oriented, logic, and database programming tool with garbage collection
US5025367A (en) * 1986-05-29 1991-06-18 Victoria University Of Manchester Storage allocation and garbage collection using liberate space tokens
US5060147A (en) * 1987-05-01 1991-10-22 General Electric Company String length determination on a distributed processing system
US5115504A (en) * 1988-11-01 1992-05-19 Lotus Development Corporation Information management system
US5392427A (en) * 1989-10-31 1995-02-21 Microsoft Corporation System for updating data stored on a flash-erasable, programmable, read-only memory (FEPROM) based upon predetermined bit value of indicating pointers

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8529890D0 (en) * 1985-12-04 1986-01-15 Watson P Garbage collection in computer system

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4408273A (en) * 1980-05-27 1983-10-04 International Business Machines Corporation Method and means for cataloging data sets using dual keyed data sets and direct pointers
US4584644A (en) * 1981-03-16 1986-04-22 International Business Machines Corp. Method of controlling use of resources in a data processing system by at least two processes
US4704678A (en) * 1982-11-26 1987-11-03 Inmos Limited Function set for a microcomputer
US4507752A (en) * 1983-02-22 1985-03-26 International Business Machines Corporation In-place index compression
US4630234A (en) * 1983-04-11 1986-12-16 Gti Corporation Linked list search processor
US4606002A (en) * 1983-05-02 1986-08-12 Wang Laboratories, Inc. B-tree structured data base using sparse array bit maps to store inverted lists
US5025367A (en) * 1986-05-29 1991-06-18 Victoria University Of Manchester Storage allocation and garbage collection using liberate space tokens
US4953122A (en) * 1986-10-31 1990-08-28 Laserdrive Ltd. Pseudo-erasable and rewritable write-once optical disk memory system
US5060147A (en) * 1987-05-01 1991-10-22 General Electric Company String length determination on a distributed processing system
US4953080A (en) * 1988-04-25 1990-08-28 Hewlett-Packard Company Object management facility for maintaining data in a computer system
US4989132A (en) * 1988-10-24 1991-01-29 Eastman Kodak Company Object-oriented, logic, and database programming tool with garbage collection
US5115504A (en) * 1988-11-01 1992-05-19 Lotus Development Corporation Information management system
US5392427A (en) * 1989-10-31 1995-02-21 Microsoft Corporation System for updating data stored on a flash-erasable, programmable, read-only memory (FEPROM) based upon predetermined bit value of indicating pointers

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Cooper et al., "OH| Pascal", 1982; pp. 475-523.
Cooper et al., OH Pascal , 1982; pp. 475 523. *
Kruse, "Data Structures & Program Design", by Prentice-Hall 1984, pp. 40-83.
Kruse, Data Structures & Program Design , by Prentice Hall 1984, pp. 40 83. *

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7774576B2 (en) 1995-07-31 2010-08-10 Lexar Media, Inc. Direct logical block addressing flash memory mass storage architecture
US8032694B2 (en) 1995-07-31 2011-10-04 Micron Technology, Inc. Direct logical block addressing flash memory mass storage architecture
US8078797B2 (en) 1995-07-31 2011-12-13 Micron Technology, Inc. Increasing the memory performance of flash memory devices by writing sectors simultaneously to multiple flash memory devices
US8793430B2 (en) 1995-07-31 2014-07-29 Micron Technology, Inc. Electronic system having memory with a physical block having a sector storing data and indicating a move status of another sector of the physical block
US7908426B2 (en) 1995-07-31 2011-03-15 Lexar Media, Inc. Moving sectors within a block of information in a flash memory mass storage architecture
US8171203B2 (en) 1995-07-31 2012-05-01 Micron Technology, Inc. Faster write operations to nonvolatile memory using FSInfo sector manipulation
US8554985B2 (en) 1995-07-31 2013-10-08 Micron Technology, Inc. Memory block identified by group of logical block addresses, storage device with movable sectors, and methods
US8397019B2 (en) 1995-07-31 2013-03-12 Micron Technology, Inc. Memory for accessing multiple sectors of information substantially concurrently
USRE44653E1 (en) 1999-04-05 2013-12-17 Sandisk Il, Ltd USB flash memory device with integral memory technology driver
USRE44641E1 (en) 1999-04-05 2013-12-10 Sandisk Il, Ltd USB flash memory device with integrated USB controller
USRE42397E1 (en) 1999-04-05 2011-05-24 Sandisk Il Ltd. Architecture for a universal serial bus-based PC flash disk
USRE42443E1 (en) 1999-04-05 2011-06-07 Sandisk Il Ltd. Architecture for a universal serial bus-based PC flash disk
US6404444B1 (en) * 1999-05-13 2002-06-11 International Business Machines Corporation Method and apparatus for displaying and controlling allocation of resource in a data processing system
US7788447B2 (en) 1999-11-14 2010-08-31 Netac Technology Co., Ltd. Electronic flash memory external storage method and device
US20010026503A1 (en) * 2000-02-29 2001-10-04 Hirofumi Todo Recording apparatus, recording method, and record medium
US6732192B2 (en) * 2000-02-29 2004-05-04 Sony Corporation Disc recording scheme for enabling quick access to disc data
US8250294B2 (en) 2000-07-21 2012-08-21 Micron Technology, Inc. Block management for mass storage
US7734862B2 (en) 2000-07-21 2010-06-08 Lexar Media, Inc. Block management for mass storage
US8019932B2 (en) 2000-07-21 2011-09-13 Micron Technology, Inc. Block management for mass storage
US7917709B2 (en) 2001-09-28 2011-03-29 Lexar Media, Inc. Memory system for data storage and retrieval
US8208322B2 (en) 2001-09-28 2012-06-26 Micron Technology, Inc. Non-volatile memory control
US7944762B2 (en) 2001-09-28 2011-05-17 Micron Technology, Inc. Non-volatile memory control
US7681057B2 (en) 2001-09-28 2010-03-16 Lexar Media, Inc. Power management of non-volatile memory systems
US9489301B2 (en) 2001-09-28 2016-11-08 Micron Technology, Inc. Memory systems
US8135925B2 (en) 2001-09-28 2012-03-13 Micron Technology, Inc. Methods of operating a memory system
US8386695B2 (en) 2001-09-28 2013-02-26 Micron Technology, Inc. Methods and apparatus for writing data to non-volatile memory
US8694722B2 (en) 2001-09-28 2014-04-08 Micron Technology, Inc. Memory systems
US9032134B2 (en) 2001-09-28 2015-05-12 Micron Technology, Inc. Methods of operating a memory system that include outputting a data pattern from a sector allocation table to a host if a logical sector is indicated as being erased
US8166488B2 (en) 2002-02-22 2012-04-24 Micron Technology, Inc. Methods of directly accessing a mass storage data device
US9213606B2 (en) 2002-02-22 2015-12-15 Micron Technology, Inc. Image rescue
US6973519B1 (en) 2003-06-03 2005-12-06 Lexar Media, Inc. Card identification compatibility
US7162602B2 (en) 2004-03-16 2007-01-09 Hitachi, Ltd. More granular and more efficient write protection for disk volumes
US7725628B1 (en) 2004-04-20 2010-05-25 Lexar Media, Inc. Direct secondary device interface by a host
US8316165B2 (en) 2004-04-20 2012-11-20 Micron Technology, Inc. Direct secondary device interface by a host
US8090886B2 (en) 2004-04-20 2012-01-03 Micron Technology, Inc. Direct secondary device interface by a host
US7865659B2 (en) 2004-04-30 2011-01-04 Micron Technology, Inc. Removable storage device
US8612671B2 (en) 2004-04-30 2013-12-17 Micron Technology, Inc. Removable devices
US10049207B2 (en) 2004-04-30 2018-08-14 Micron Technology, Inc. Methods of operating storage systems including encrypting a key salt
US9576154B2 (en) 2004-04-30 2017-02-21 Micron Technology, Inc. Methods of operating storage systems including using a key to determine whether a password can be changed
US7949822B2 (en) 2004-08-27 2011-05-24 Micron Technology, Inc. Storage capacity status
US8296545B2 (en) 2004-08-27 2012-10-23 Micron Technology, Inc. Storage capacity status
US7743290B2 (en) 2004-08-27 2010-06-22 Lexar Media, Inc. Status of overall health of nonvolatile memory
US20060064432A1 (en) * 2004-09-22 2006-03-23 Pettovello Primo M Mtree an Xpath multi-axis structure threaded index
US9171100B2 (en) 2004-09-22 2015-10-27 Primo M. Pettovello MTree an XPath multi-axis structure threaded index
US8166074B2 (en) 2005-11-14 2012-04-24 Pettovello Primo M Index data structure for a peer-to-peer network
US8631028B1 (en) 2009-10-29 2014-01-14 Primo M. Pettovello XPath query processing improvements
US20130159258A1 (en) * 2010-07-02 2013-06-20 International Business Machines Corporation Data set index record preservation
US8918400B2 (en) * 2010-07-02 2014-12-23 International Business Machines Corporation Data set index record preservation
US20120005528A1 (en) * 2010-07-02 2012-01-05 International Business Machines Corporation Data set index record preservation
US8392423B2 (en) * 2010-07-02 2013-03-05 International Business Machines Corporation Data set index record preservation
US20120102282A1 (en) * 2010-10-22 2012-04-26 Wade Richards Variable length data protected by seqlock
US8495309B2 (en) * 2010-10-22 2013-07-23 Business Objects Software Limited Variable length data protected by seqlock

Also Published As

Publication number Publication date
US5247658A (en) 1993-09-21
US5392427A (en) 1995-02-21

Similar Documents

Publication Publication Date Title
USRE35881E (en) Method and system for traversing linked list record based upon write-once predetermined bit value of secondary pointers
EP0557736B1 (en) A method and system for file system management using a flash-erasable, programmable, read-only memory
KR100292011B1 (en) Flash file means
US7634613B2 (en) Memory device and recording and/or reproducing apparatus employing this memory device
US5481519A (en) Method for recording, reproducing and managing file data on a recording medium
US5987478A (en) Virtual small block file manager for flash memory array
EP0462180B1 (en) Method of reading and writing files on nonerasable storage media
US5442611A (en) Method of recording information on record medium having data record region and file management information record region
JPS63103341A (en) Control process of file by non-erasable information medium
JP2774691B2 (en) File system
JPH01116819A (en) Optical disk management system by hierarchical directory
JP4443705B2 (en) Data filing system and data filing method
JPH043234A (en) Filing control method for fixed length type record
JPH0371244A (en) Data control system
JPH0256021A (en) Managing system for disk data

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0001

Effective date: 20141014