Computer system, virtual computer system, computer activation management method and virtual computer activation management method

ABSTRACT

A virtual computer system has a plurality of computers for executing a program and a storage system connected to the computers via a network. A virtualization mechanism in a first computer of the plurality of computers generates at least one virtual computer on the first computer. The virtualization mechanism in the first computer executes at least one of a first judgment and a second judgment when a request for activating a first virtual computer of the at least one virtual computer is received, the first judgment being for judging whether or not the activation of the first virtual computer is prohibited based on first information stored in a memory of the virtualization mechanism, and the second judgment being for judging whether or not an identifier included in a logic I/O adapter device assigned to the first virtual computer is invalid based on second information stored in the memory of the virtualization mechanism. The activation of the first virtual computer is permitted or prohibited based on the executed judgment in response to the request for activating the first virtual computer.

BACKGROUND OF THE INVENTION

This invention relates to a method of managing the activation or bootingof a computer system and a virtual computer system, or in particular, toa technique for suppressing the activation of the computer.

The virtualization technique for concentrating a plurality of jobs on asingle computer improves the utilization efficiency of the hardwareresources such as the processor, the memory and the input and outputunits on the one hand and can change the resource assignment inaccordance with the processing amount on the other hand.

A configuration in which a plurality of computers are activated byreading the operating system (OS) from the same storage volume, on theother hand, can change the computer for executing a job. Theconfiguration of a storage unit that can be shared by a plurality ofcomputers is called a storage area network (SAN), in which the storageunit and the computers are connected through a fiber channel switch or astorage switch.

In the storage unit that can be shared, the storage volume can beaccessed or updated from all the computers connected, and therefore, theproblem of security has been posed. To overcome this problem, thestorage unit sets a specified computer in correspondence with thestorage volume in the storage unit using a world wide name (WWN) asunique device identification information stored in a host bus adapter(HBA) making up an I/O adapter of the fiber channel (FC) held by thecomputer.

This function of setting in correspondence is called a host group, andby use of the host group, the right of access to the storage volume isgranted only to a computer having the HBA with the WWN thereofregistered in the storage volume.

In the case where a plurality of computers are prepared to execute ajob, either the WWN of the computer executing the job is registered anewin the host group each time the computer is switched, or the WWNs of theplurality of the computers are registered in the host group beforehand.The WWN is registered anew each time of switching the computer at thesacrifice of a bothersome operation.

The advance registration of the WWNs of a plurality of computers in thehost group, on the other hand, makes it possible for the plurality ofthe computers to access the same storage volume, and therefore, fails tosolve the security problem.

In view of this, U.S. Pat. No. 7,321,927 discloses a management serverwhich simplifies the operation by eliminating the need of changing thesetting in the host group. According to this method, the WWN istransferred to that of the new computer to which the computer executingthe job is changed. A plurality of WWNs assignable to a plurality ofcomputers and the storage area identification information are stored incorrespondence with each other in the management server in advance, anda WWN and the corresponding storage area identification information aresent from the management server to the computer executing the job. Thecomputer executing the job sets the WWN and is booted from the areaindicated by the storage area identification information.

In the case where these computers are virtual computers, avirtualization mechanism defines a virtual I/O adapter to store uniquevirtual device identification information. U.S. Published ApplicationNo. 2006/0195617 discloses a system in which the unique virtual deviceidentification information is set in the I/O adapter of the virtualcomputer using the technique by which a plurality of deviceidentification information can be registered in the I/O adapter of acomputer. With this system, the WWN registered in the host group of thestorage unit can be rendered to coincide with the WWN of the virtual I/Oadapter of the virtual computer, and therefore, only a specified virtualcomputer can access the storage volume.

Conventionally, in the case where the computer executing the job isswitched from a virtual computer to a (physical) computer or to avirtual computer on a different computer, the registration change or themultiple registration in the host group is avoided by transferring thedevice identification information set in the I/O adapter to that of thecomputer to which the computer executing the job is switched.

In this system, assume that it becomes impossible to use the managementserver, the operation is interfered with by other than the managementserver, or an application occurs in which the same device identificationinformation would be originally set in a plurality of computers. In sucha case, a plurality of computers may come to have the same deviceidentification information.

Once a plurality of computers having the same device identificationinformation are activated, the problem is posed that the access controlmechanism of the storage unit fails to work effectively, with the resultthat a plurality of computers can undesirably access the same storagevolume. Also, in the case where the I/O adapter is a network interface,a communication error may be caused if a plurality of computers have thesame network device identification information such as a MAC address.

SUMMARY OF THE INVENTION

Accordingly, it is an object of this invention to provide a computeractivation management method in which even in the case where a virtualcomputer or a computer with the device identification informationchangeable to switch the job-execution computer is triggered at a timingnot intended by the user, the computer can be controlled not to beactivated.

The above and other objects, features and advantages will be madeapparent by the detailed description taken in conjunction with theaccompanying drawings.

A typical computer system disclosed by this invention is brieflydescribed below.

Specifically, a typical computer system according to the inventionincludes an I/O adapter for storing information indicating whethersetting the activation of the computer is valid or invalid, and anactivation management unit for preventing the computer from beingswitched on in the case where information contained in the computerswitch-on command received is judged as invalid based on the informationstored in the I/O adapter.

Also, a computer system according to the invention comprises avirtualization mechanism including a device identification managementtable for storing a logic I/O adapter and device identificationinformation assignable to a virtual computer in correspondence with eachother, and a virtual computer activation unit for checking the deviceidentification information corresponding to the logic I/O adapterassigned to the virtual computer based on the device identificationmanagement table and suppressing the activation of the virtual computerin the case where the device identification information has a valueindicating the activation suppression.

According to a first aspect of the invention, there is provided acomputer activation management method for a computer system comprising aplurality of computers for executing a program and a storage systemconnected to the computers through a network, wherein the computers eachinclude an I/O adapter connected to the network and an activationmanagement unit for controlling the power on/off of the computers,wherein the I/O adapter stores information as to whether setting theactivation of each computer is valid or invalid, and wherein theactivation management unit, upon reception of a switch-on command forthe computer, prevents the computer from being switched on in the casewhere the information contained in the command is judged as invalidbased on the information stored in the I/O adapter.

According to a second aspect of the invention, there is provided avirtual computer activation management method for a virtual computersystem comprising a plurality of computers for executing a program, astorage system connected to the computers through a network and avirtualization mechanism built in each computer to generate a virtualcomputer on the computer, wherein the virtualization mechanism storesthe correspondence between the logic I/O adapter and deviceidentification information assignable to the virtual computer, checksthe device identification information corresponding to the logic I/Oadapter assigned to the virtual computer at the time of activating thevirtual computer, and suppresses the activation of the virtual computerin the case where the device identification information has a valueindicative of the activation suppression.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram showing the configuration of the computer systemaccording to a first embodiment of the invention.

FIG. 2 is a diagram showing the detailed configuration of each of thecomputers of the computer system according to the first embodiment ofthe invention.

FIG. 3 is a flowchart showing the operation of each activationmanagement unit of the computer system according to the first embodimentof the invention.

FIG. 4 is a diagram showing the configuration of a computer of thevirtual computer system according to a second embodiment of theinvention.

FIG. 5 is a diagram showing the format of the commands used in thevirtual computer system according to the second embodiment of theinvention.

FIG. 6 is a diagram showing the detail of the WWN management table usedin the virtual computer system according to the second embodiment of theinvention.

FIG. 7 is a diagram showing the detail of the device management tableused in the virtual computer system according to the second embodimentof the invention.

FIG. 8 is a diagram showing the detail of the LPAR management table usedin the virtual computer system according to the second embodiment of theinvention.

FIG. 9 is a diagram showing the process executed in the WWN managementunit of the computers of the virtual computer system according to thesecond embodiment of the invention.

FIG. 10 is a flowchart showing the process executed in the LPARmanagement unit of the computers of the virtual computer systemaccording to the second embodiment of the invention.

FIG. 11 is a flowchart showing the MAC element changing process for thecomputers of the virtual computer system according to the secondembodiment of the invention.

FIG. 12 is a flowchart showing the process executed in the LPARactivation unit of the computers of the virtual computer systemaccording to the second embodiment of the invention.

DETAILED DESCRIPTION OF THE INVENTION

The advantage of a typical embodiment of the invention disclosed by thepresent application is briefly explained below.

Specifically, the advantage of a typical embodiment of the invention isthat the virtual computer or the computer can be controlled not to beactivated even in the case where the computer is triggered at a timingnot intended by the user.

Embodiments of the invention are described in detail below withreference to the drawings. Incidentally, in all the drawings forexplaining the embodiments, the same component members are basicallydesignated by the same reference numerals, respectively, and notdescribed repeatedly.

First Embodiment

With reference to FIG. 1, the configuration of the computer systemaccording to a first embodiment of the invention is explained. FIG. 1 isa diagram showing the configuration of the computer system according tothe first embodiment of the invention.

In FIG. 1, the computer system is configured of a plurality of computers100, a storage system 160, a storage switch 140 for connecting theplurality of computers 100 and the storage system 160 and a networkswitch 150. Also, the network switch 150 is connected with a terminal190 for various settings.

The plurality of the computers 100 are each connected to the storageswitch 140 through a host bus adapter (HBA) 110 of the fiber channel,and also to the network switch 150 through a network interface card(NIC) 120.

Also, the storage switch 140 and the network switch 150 are connected tothe storage system 160 through an HBA 161 and a NIC 162, respectively,and thus permit access from the plurality of the computers 100.

Each computer 100 has built therein a BMC (baseboard managementcontroller) 130 and, therefore, the power supply of the hardware can becontrolled through the network.

A disk management unit 170 in the storage system 160 has the function ofsetting the host group to limit the computers 100 accessible to diskvolumes 180. The disk management unit 170 also relates the HBA 110mounted on each computer 100 to the disk volumes 180, and stores therelation as host management information 175. The host managementinformation 175 is set from the terminal 190.

The computers 100 can also use the blades of a blade system. One of theblades may be assigned to the terminal 190. Also, the plurality of thecomputers 100 may be installed at mutually distant places.

Next, the detailed configuration of each of the computers included inthe computer system according to the first embodiment is explained withreference to FIG. 2. FIG. 2 is a diagram showing a detailedconfiguration of each computer of the computer system according to thefirst embodiment of the invention.

The computer 100 is configured of a display unit 310 for displaying thecomputer status and a program execution result, an input unit 320 forsupplying data to the program, a memory 330 for holding the jobprocessing program and the data, a CPU 340 for executing the program, anHBA 110, a NIC 120 and a BMC 130.

The HBA 110 holds a unique identifier called WWN required to specify tothe other party of the fiber channel communication. The BMC 130, on theother hand, mainly monitors and controls the hardware of the computer100. The BMC 130 has an activation management unit 135 and can switchon/off the power of the computer 100 at the request of the terminal 190.

Next, the operation of the activation management unit of the computersystem according to the first embodiment of the invention is explainedwith reference to FIG. 3. FIG. 3 is a flowchart showing the operation ofthe activation management unit of the computer system according to thefirst embodiment of the invention.

The computer 100 is activated by the activation management unit 135 ofthe BMC 130.

First, in step 1210, the request to switch on the power of the computer100 is accepted. Incidentally, the BMC 135 can be activated with anotherpower supply before activating the computer 100.

Then, the definition information for an invalid WWN is acquired in step1215.

The definition information of an invalid WWN acquired in step 1215 is,for example, a value set beforehand in the activation management unit135 in response to an external command or by an external operation, avalue stored in the BMC 130 and changeable later through the interface,or a value not held in the BMC 130 but input from an external computerat the time of executing the process of step 1215.

Next, the process proceeds to step 1220, in which the WWN of the HBA 110is read and checked as to whether it coincides with the definitioninformation of an invalid WWN acquired in step 1215.

When step 1220 judges that an invalid WWN is registered, step 1230generates error information indicating that the computer 100 cannot beactivated by switching on power.

Upon judgment in step 1220 that an invalid WWN is not registered, on theother hand, the computer 100 is switched on and activated in step 1240.

Finally, in step 1250, the processing result such as informationindicating the successful computer activation or the error informationprohibiting the switch-on power is output to the source of activation.

As described above, according to this embodiment, the activation, ifrequested, of the computer 100 can be suppressed by the BMC 130. Even inthe case where the same I/O adapter identifier is set on differentcomputers 100, the registration of an invalid WWN in at least one HBA110 can suppress the activation of the computer having the particularHBA 110.

As described above, according to this embodiment, assume that the sameI/O adapter identifier is set on different computers or the LPARs ofdifferent computers. Even in that case, by registering an invalid WWN onat least one HBA 110, the activation of the computer having theparticular HBA 110 is suppressed.

This process makes it possible to control the computer not to beactivated even in the case where the computer activation is triggered ata timing not intended by the user.

Second Embodiment

The second embodiment represents a virtual computer system equivalent tothe first embodiment in which the computer 100 further includes avirtualization mechanism and which is operated with the LPAR under thecontrol of the virtualization mechanism to perform the computeractivation management.

With reference to FIG. 4, the configuration of each computer of thevirtual computer system according to the second embodiment of theinvention is explained. FIG. 4 is a diagram showing the configuration ofeach computer of the virtual computer system according to the secondembodiment of the invention, which is similar to the configuration ofthe computer system according to the first embodiment shown in FIG. 1.

In FIG. 4, the computer 100, as compared with the computer 100 shown inFIG. 2, includes a virtualization mechanism 220 in addition to an HBA110, a NIC 120, a BMC 130, and a display unit 310, an input unit 320, amemory 330 and a CPU 340 not shown. In the virtualization mechanism 220,the CPU 340 and the memory 330 of one physical computer are divided andassigned to the LPARs (logical partitions) 200. The LPARs 200 make up avirtual computer.

As a result, the single computer 100 presents the appearance of aplurality of logic computers LPAR 200. Each LPAR 200, like the computer100, includes a virtual HBA 210 and a virtual NIC 215. A unique WWN isassigned to the port of the virtual HBA 210.

Also, a WWN management unit 115 of the HBA 110 of the computer 100 has aplurality of port identification information (N port IDs), and the WWNof each virtual HBA 210 can be registered in the virtual port of the HBA110.

The virtualization mechanism 220 includes a WWN management unit 230, adevice management unit 240, an LPAR management unit 250, an LPARactivation unit 260 and a memory 270.

The memory 270 stores the computer identification information 235, a WWNmanagement table 400 making up a device identification management table,a device management table 500, virtualization mechanism identificationinformation 255 and an LPAR management table 700. The virtualizationmechanism 220, to which the operation request is input from the terminal190, operates the LPAR 200 using the data stored in the memory 270 andoutputs the operation result to the terminal 190.

Next, the commands and the tables used in the virtual computer systemaccording to the second embodiment of the invention are explained withreference to FIGS. 5 to 8. FIGS. 5 to 8 are diagrams showing thecommands and the tables used in the virtual computer system according tothe second embodiment of the invention. FIG. 5 is a diagram showing thecommand formats, FIG. 6 a diagram showing the detail of the WWNmanagement table, FIG. 7 a diagram showing the detail of the devicemanagement table, and FIG. 8 a diagram showing the detail of the LPARmanagement table.

In FIG. 5, the command 600 input to the virtualization mechanism 220 hasa format including a command 610, a request code 620 indicating thedetailed request content of the command, and a parameter 630 requiredfor the command. Two or more parameters 630 may be included depending onthe command 610 and the request code 620.

As shown in FIG. 5, for example, the command 610 includes a WWNregistration command 601 and LPAR management commands 602 to 604. Therequest code 620, on the other hand, includes an invalid/reset/updatecode, a change attribute, a MAC element and the activation suppression.The information following the request code makes up the parameter 630.

In FIG. 6, the WWN management table 400 stores a list of the virtualHBAs 210 assignable to the LPARs 200.

A column 410 designates the slot information indicating the mountingposition of the HBA 110. In the case where the computer is a blade, theslot mounting sequence information for each blade may be used as theslot information.

The column 420 designates the port information held by each HBA 110. Thecolumn 430 designates a common number whereby one port is shared by aplurality of LPARs 200. In the case of FIG. 6, the HBA 110 can hold VFC1to VFC4, and therefore, four LPARs 200 can share each port.

The column 440 designates the WWN assigned to the virtual HBA 210indicated by the columns 410, 420 and 430. Once the WWN of the column440 is changed, the virtual HBA 210 of the LPAR 200 to which theparticular port is assigned uses the WWN after the change. The column450 stores the LPAR information of the LPAR 200 with the port of thevirtual HBA 210 assigned to the LPAR 200.

In FIG. 7, the device management table 500 stores the information on theI/O adapter including the virtual HBA 210 and the virtual NIC 215assigned to the LPAR 200.

The column 510 designates the identification information of the LPAR200. The column 520 designates the slot information of the I/O adapterused by the LPAR 200. The column 530 designates the port information ofthe I/O adapter used by the LPAR.

The column 540 designates the management number. In the case where theI/O adapter is the virtual NIC (VNIC) 215, the management number is aunique VNIC number in the LPAR 200. In the case where the I/O adapter isthe virtual HBA 210, on the other hand, the management number is acommon number used in the WWN management table 400.

The column 550 designates the information indicating whether the I/Oadapter is the virtual NIC 215 or the virtual HBA 210. In the devicemanagement table 500, the row can be added at the time of assigning theI/O adapter to the LPAR 200, or the row can be deleted or the contentsof registration changed at the time of canceling the assignment of theI/O adapter. The column 560 designates the adapter type.

Once the virtual HBA 210 is assigned to the LPAR 200, the identificationinformation of the LPAR 200 is stored in the column 450 of the WWNmanagement table 400. In the case where the assignment is canceled, onthe other hand, the information stored in the column 450 is deleted.

The job processing program executed by the LPAR 200 uses the WWN as theidentification information of the virtual HBA 210. The WWN thus used isdesignated in the column 440 in the row corresponding to the virtual HBA210 assigned to the LPAR 200 in the WWN management table 400. In thecase where the virtualization mechanisms 220 of different computers 100register the same WWN in the column 440 of the WN management table,respectively, LPARs 200 of the same WWN configuration can beconstructed. Between the LPARs 200 of this same WWN configuration, thejob processing program can be relocated without changing the host groupsetting of the storage system 160.

In FIG. 8, the LPAR management table 700 stores the LPAR operation andthe definition generated at the time of initial activation of thevirtualization mechanism 220 and required for managing each LPAR.

The column 710 designates information for identifying the LPAR 200. Thecolumns 720 and 730 store information used to generate the MAC addressfor identifying the virtual NIC 215. Specifically, the column 720 storesinformation as to whether the value of the virtualization mechanismidentification information 255 is used or not, or if not used, whatvalue is used to generate the unique MAC address in the computer system.

Similarly, the column 730 stores information as to whether theidentification information of the LPAR 200 including the virtual NIC 215is used or not, or if not used, what value is used as an element togenerate the MAC address. The column 740 stores information as towhether the change in the definition information of the LPAR 200 isprohibited or not. An example of the definition information of the LPARis the information on the I/O adapter assigned to the LPAR managed inthe table 500.

The column 750 designates information as to whether the LPAR 200 can beactivated or not. Even in the case where an activation request is inputto the LPAR with the activation suppression in the on state, thevirtualization mechanism 220 controls the particular LPAR not to beactivated. The column 760, on the other hand, designates information asto whether the LPAR 200 is in activation or not.

Next, the process executed by the WWN management unit of the computersof the virtual computer system according to the second embodiment of theinvention is explained. FIG. 9 is a flowchart showing the processexecuted by the WWN management unit of the computers of the virtualcomputer system according to the second embodiment of the invention.This flowchart shows the process of registering a list of the WWNs ofthe virtual HBA 210 managed by the virtualization mechanism 220.

First, step 810 accepts a request for updating the WWN management table400. The request thus accepted is a WWN registration command in the formdesignated by numeral 601 in FIG. 5. The request code 620 is indicativeof an invalid WWN registration, the restoration of WWN to the initialvalue or a change in WWN. The parameter 630 includes the slot number,the port number and the common number. In the case where the requestcode indicates a change in WWN, the WWN value after change is receivedalso with the parameter 630.

Then, step 820 checks whether the WWN management table 400 is stored inthe memory 270 or not. Upon judgment in step 820 that the WWN managementtable 400 is not so stored, step 825 secures an area for the WWNmanagement table 400 in the memory 270, and based on the number of HBAs110 mounted, generates the rows in the number equal to the total numberof sets of the slot number, the port number and the common number. Also,step 827 stores the initial WWN value in the column 440 on each row.

The initial WWN value is, for example, a unique value of 64 bitsgenerated using the slot number, the port number, the common number andthe computer identification information 235. The computer identificationinformation 235 can be the identifier of the blade with the computer 100mounted thereon and the identifier of the chassis accommodating theblade.

Upon judgment in step 820 that the WWN management table 400 is stored inthe memory 270, on the other hand, step 830 judges whether the requestcode 620 indicates an invalid WWN setting request. Upon judgment in step830 that the request code 620 is indicative of an invalid WWN setting,step 835 stores the invalid WWN information in the column 440 in the rowthat can be specified from the parameter 630 indicating the slot number,the port number and the common number in the WWN management table 400.Then, the process proceeds to step 880.

The invalid WWN information is, for example, the 64-bit information suchas the hexadecimal value 2000000000000000 defined in advance by thevirtualization mechanism 220.

In the case where the judgment in step 830 is NO, the process proceedsto step 840. Step 840 judges whether the request code 620 indicates thereset request to restore the WWN to the initial value, and upon judgmentin step 840 that the request code 620 indicates the reset request, step845 generates the initial WWN value from the computer identificationinformation 235 and the value of the parameter 630 indicating the slotnumber, the port number and the common number.

In the case where the judgment in step 840 is NO, step 850 judgeswhether the request code 620 is indicative of the WWN update request ornot. Upon judgment in step 850 that the request code 620 is indicativeof the WWN update request, the process proceeds to step 860, while inthe case where the judgment in step 850 is NO, on the other hand, theprocess proceeds to step 880.

Step 860 judges whether the initial WWN value generated in step 845 orthe changed WWN received with the parameter 630 is registered on otherthan the corresponding row in the WWN management table 400 or not. Uponjudgment in step 860 that a WWN already registered exists, step 865generates the error information indicating that the changed WWN doubleswith the existing WWN. Upon judgment in step 860 that there is no WWNregistered, on the other hand, step 870 changes the column 440 on thecorresponding row to the initial WWN value or the changed WWN receivedwith the parameter 630.

Finally, step 880 sends to the requester the processing resultindicating the failure of registration in the WWN management table 400,the WWN information before or after the change or no registration.

Incidentally, before changing the WWN in step 870, the column 740 of theLPAR management table 700 may be checked and in the case where the WWNis associated with the virtual HBA 210 of the LPAR with the definitionchange prohibition registered, the change of the WWN may be prohibited.

As described above, the WWN used by the virtual HBA 210 can be changedin the virtualization mechanism 220. When changed to the WWN thus farused in the LPAR 200 of a different computer 100, therefore, the diskvolume 180 thus far used in the LPAR 200 of the different computer 100can be accessed from the LPAR 200 with the changed WWN without changingthe host management information 175.

Next, the process executed in the LPAR management unit of the computersof the virtual computer system according to the second embodiment of theinvention is explained with reference to FIGS. 10 and 11. FIG. 10 is aflowchart showing the process executed in the LPAR management unit ofthe computers of the virtual computer system according to the secondembodiment of the invention, and FIG. 11 a flowchart showing thedetailed process of changing the MAC element of the computers of thevirtual computer system according to the second embodiment of theinvention.

First, step 1010 accepts the update request for the LPAR managementtable 700. The request thus accepted is the LPAR management command in aform designated by numeral 602, 603 or 604 in FIG. 5.

In the case where the request code 620 represents a request to changethe definition change attribute, the form 602 is used and the parameter630 assumes a value indicating the LPAR information and whether thedefinition change is prohibited or the prohibition thereof is canceled.In the case where the request code 620 represents a request to changethe MAC element, on the other hand, the form 603 is used and theparameter 630 assumes a value indicating the LPAR information andwhether the MAC element is reset to the initial value or changed, and ifchanged, a value including two values, i.e., a value used as theinformation on the virtualization mechanism and a value of the LPARinformation used as the MAC element. In the case where the request code620 represents a request to set the activation suppression of the LPAR,the form 604 is used and the parameter assumes a value indicating theLPAR information and whether the activation suppression is turned on oroff.

Then, step 1020 judges whether the request code 620 is indicative of arequest to register the definition change attribute or not. Uponjudgment in step 1020 that the request code 620 is indicative of therequest to register the definition change attribute, step 1025 storesthe information on the prohibition or the prohibition cancellation ofthe parameter 630 in the column 740 in the row corresponding to the LPARinformation of the parameter 630, and the process proceeds to step 1080.

Upon judgment in step 1020 that the request code 620 is not indicativeof a request to register the definition change attribute, step 1030judges whether the definition change prohibition in the column 740 inthe row corresponding to the LPAR information of the parameter 630 isregistered or not. Upon judgment in step 1030 that the value indicatingthe change prohibition is stored, step 1035 generates the definitionchange prohibition error information indicating the command executionresult of the definition change prohibited, and the process proceeds tostep 1080.

Upon judgment in step 1030 that the definition change is possible, theprocess proceeds to step 1040 to judge whether the request code 620 isindicative of the MAC element change request or not. Upon judgment instep 1080 that the request code 620 is indicative of the MAC elementchange request, the process proceeds to step 1045.

Now, the process of step 1045 is described in detail with reference tothe flowchart of FIG. 11.

First, in the MAC address element change process of step 1045, step 910judges whether the parameter 630 contains a value indicative ofresetting the MAC address generation element, and upon judgment in step910 that the parameter 630 contains a value indicative of resetting theMAC address generation element, step 915 provisionally generates the MACelement after resetting. This MAC element is the value stored in thecolumns 720 and 730 at the time of generating the LPAR management table700 initially, and includes both a value indicating the use of the valueof the virtualization mechanism identification information 255 and avalue indicated by the LPAR information designated by the parameter 630.

Upon judgment in step 910 that the parameter 630 contains a valueindicative of not resetting but changing the MAC address generationelement, on the other hand, the process proceeds to step 920 to acquirethe values of the columns 720 and 730 corresponding to the LPARinformation designated by the parameter 630.

Next, step 930 judges whether the MAC element after resetting or thevalue of the element LPAR and the virtualization mechanismidentification information delivered with the parameter 630 is alreadystored in another LPAR not in the row of the particular element LPAR.

Upon judgment in step 930 that the value of the element LPAR is alreadyregistered, step 935 generates the error information that the MACelement after change doubles as another LPAR, and the process proceedsto step 960.

Upon judgment in step 930 that the value of the element LPAR is notregistered, on the other hand, step 940 changes the columns 720 and 730in the particular row to a designated value, and the process proceeds tostep 960.

Finally, step 960 sends, to step 1080 in FIG. 10, the error informationor the information indicating that the MAC element is successfullyregistered.

In the case where step 1040 judges that the request code 620 is notindicative of the MAC element change request, on the other hand, theprocess proceeds to step 1050. Step 1050 judges whether the request code620 is indicative of the request to register the LPAR activationsuppression attribute or not. Upon judgment in step 1050 that therequest code 620 is indicative of the request to register the LPARactivation suppression attribute, the process proceeds to step 1060.Upon judgment in step 1050 that the request code 620 is not indicativeof the request to register the LPAR activation suppression attribute, onthe other hand, the process proceeds to step 1080.

Step 1060 judges whether the column 760 in the row corresponding to theLPAR information delivered with the parameter 630 assumes a valueindicating the in-activation state. Upon judgment in step 1060 that theparticular column assume a value indicating the in-activation state,step 1065 generates change error information due to the in-activationstate of the LPAR.

In the case where step 1060 judges that LPAR is not in activation, onthe other hand, the process proceeds to step 1070, and the on or offstate of the activation suppression attribute delivered with theparameter 630 is registered in the column 750.

Finally, the information indicating the successful registration in theLPAR management table 700 or the error information is output to thecommand requester in step 1080.

The job processing program executed by the LPAR 200 may use a virtualMAC address as the identification information of the virtual NIC 215.The virtual mechanism 220 can change the MAC element used to generatethe value of the MAC address used by the virtual NIC 215.

Once the MAC element is changed to the one thus far used by the LPAR 200of a different computer 100, network communication similar to the LPAR200 of the different computer 100 becomes possible. Specifically, thejob processing program can be relocated between the LPARs 200 withoutchanging the communication setting of the job processing program or thedevice management table 500.

Next, the process executed by the LPAR activation unit of the computersof the virtual computer system according to the second embodiment of theinvention is explained with reference to FIG. 12. FIG. 12 is a flowchartshowing the process executed by the LPAR activation unit of thecomputers of the virtual computer system according to the secondembodiment of the invention.

First, the LPAR activation request is accepted in step 1110.

Then, step 1120 judges from the LPAR management table 700 whether thecolumn 760 in the row corresponding to the LPAR of which the activationis requested assumes a value indicating the in-activation state. Uponjudgment in step 1120 that the LPAR is not in activation, the processproceeds to step 1130, while upon judgment in step 1120 that the LPAR isin activation, on the other hand, the process proceeds to step 1160.

Step 1130 judges from the LPAR management table 700 whether the column750 in the row corresponding to the LPAR of which the activation isrequested assumes the on-state value indicating that the activation ofthe LPAR is suppressed.

Upon judgment in step 1130 that the column 750 is not in the on state,the process proceeds to step 1140, while upon judgment in step 1130 thatthe column is in the on state, on the other hand, the process proceedsto step 1160.

Step 1140 judges whether an LPAR is assigned the virtual HBA 210 with aninvalid WWN registered therein. This judgment is made by determining,using the WWN management table 400, whether the value stored in thecolumn 440 coincides with an invalid WWN for all the rows for which theidentifier of the LPAR to be activated is registered in the column 450.

Upon judgment in step 1140 that an invalid WWN is registered, step 1160generates the error information that the LPAR cannot be activated.

Upon judgment in step 1140 that an invalid WWN is not registered, on theother hand, the LPAR is activated in step 1150. In the process, thevalue indicating that the LPAR is in activation is registered in thecolumn 760 in the row of the corresponding LPAR of the LPAR managementtable 700. Further, the information for identifying the I/O adapter isstored in the column 560 of the device management table 500.

In the case where the device type of the column 550 is NIC, a MACaddress generated by combining the MAC elements of the columns 720, 730of the LPAR management table 700 with the value of the column 540 of thedevice management table 500 is used as the identification information.In the case where the device type of the column 550 is HBA, on the otherhand, the WWN stored in the column 440 of the WWN management table 400is used.

Finally, in step 1170, the processing result such as the informationindicating that the LPAR is successfully activated or the errorinformation that the LPAR has failed to be activated is output to therequester.

As described above, according to this embodiment, the virtualizationmechanism 220 can prepare an LPAR of which the activation is suppressedagainst an activation request. Even in the case where the same I/Oadapter identifier is set on the LPARs of different computers,therefore, the simultaneous activation of the plurality of these LPARswhich otherwise might be caused by a careless LPAR operation can besuppressed.

By executing the process as described above, the virtual computer, iftriggered at a timing not intended by the user, can be controlled not tobe activated.

The embodiments of the invention achieved by the present inventor arespecifically described above. Nevertheless, this invention is notlimited to such embodiments, and can of course be variously modifiedwithout departing from the spirit of the invention.

The present invention relating to the computer activation managementmethod for the computer system and the virtual computer system is widelyapplicable to systems for controlling by suppression of the activationof a computer and a virtual computer.

1. A virtual computer system comprising a plurality of computers forexecuting a program and a storage system connected to the computers viaa network, wherein a virtualization mechanism in a first computer of theplurality of computers generates at least one virtual computer to whicha physical CPU and a physical memory of the first computer are dividedand assigned, wherein the virtualization mechanism in the first computerexecutes at least one of a first judgment and a second judgment when arequest for activating a first virtual computer of the at least onevirtual computer is received, wherein the first judgment is for judgingwhether or not the activation of the first virtual computer isprohibited based on first information stored in a memory of thevirtualization mechanism, wherein the second judgment is for judgingwhether or not an identifier included in a logic I/O adapter deviceassigned to the first virtual computer is invalid based on secondinformation stored in the memory of the virtualization mechanism,wherein the activation of the first virtual computer is permitted orprohibited based on the executed at least one of the first judgment andthe second judgment in response to the request for activating the firstvirtual computer, and wherein the virtualization mechanism includes: amanagement table for storing a correspondence between the first virtualcomputer and a setting for prohibiting activation of the first virtualcomputer, the setting being either valid or invalid, and a virtualcomputer activation unit for executing the first judgment for checkingthe setting for prohibiting activation of the first virtual computerbased on the management table when the virtual mechanism accepts anactivation request for the first virtual computer, and for prohibitingthe activation of the first virtual computer if the setting forprohibiting the activation is set to be valid.
 2. The virtual computersystem according to claim 1, wherein the virtualization mechanismincludes a virtual computer activation unit for executing the firstjudgment and the second judgment.
 3. The virtual computer systemaccording to claim 1, wherein the first information corresponds to thesetting for prohibiting activation of the first virtual computer.
 4. Thevirtual computer system according to claim 1, wherein the virtualizationmechanism includes: a management table for storing a correspondencebetween the identifier and the logic I/O adapter device assigned to thefirst virtual computer; and a virtual computer activation unit forexecuting the second judgment for checking the identifier correspondingto the logic I/O adaptor device assigned to the first virtual computerbased on the management table when the first virtual computer isactivated, and for prohibiting the activation of the first virtualcomputer when the identifier is registered to be an invalid identifier.5. The virtual computer system according to claim 1, wherein a worldwide name (WWN), which is registered in correspondence with the logicI/O adapter device, is used as the identifier.
 6. The virtual computersystem according to claim 1, wherein, in the first judgment, if thefirst virtual computer is prohibited then the first virtual computer isnot activated, and if the first virtual computer is not prohibited thenthe second judgment is executed; and wherein, in the second judgment, ifthe identifier included in the logic I/O adapter device to which thefirst virtual computer is assigned is invalid then the first virtualcomputer is not activated, and if the identifier included in the logicI/O adapter device to which the first virtual computer is assigned isnot invalid, then the first virtual computer is activated.
 7. Thevirtual computer system according to claim 1, wherein the logic I/Oadapter device is a virtual HBA or a virtual NIC; and wherein theidentifier included in the logic I/O adapter device is a world wide name(WWN).
 8. The virtual computer system according to claim 1, wherein theat least one virtual computer includes at least the first virtualcomputer and a second virtual computer.
 9. A virtual computer systemcomprising a plurality of computers for executing a program and astorage system connected to the computers via a network, wherein avirtualization mechanism in a first computer of the plurality ofcomputers generates at least one virtual computer to which a physicalCPU and a physical memory of the first computer are divided andassigned, wherein the virtualization mechanism in the first computerexecutes at least one of a first judgment and a second judgment when arequest for activating the first virtual computer of the at least onevirtual computer is received, wherein the first judgment is for judgingwhether or not the activation of the first virtual computer isprohibited based on first information stored in a memory of thevirtualization mechanism, wherein the second judgment is for judgingwhether or not an identifier included in a logic I/O adapter deviceassigned to the first virtual computer is invalid based on secondinformation stored in the memory of the virtualization mechanism,wherein, when the first virtual computer is requested to be activated,the activation of the first virtual computer is prohibited if a settingfor prohibiting the activation is valid in the first judgment or if theidentifier is registered to be an invalid identifier in the secondjudgment, and wherein the virtualization mechanism includes: amanagement table for storing a correspondence between the first virtualcomputer and a setting for prohibiting activation of the first virtualcomputer, the setting being either valid or invalid, and a virtualcomputer activation unit for executing the first judgment for checkingthe setting for prohibiting activation of the first virtual computerbased on the management table when the virtual mechanism accepts anactivation request for the first virtual computer, and for prohibitingthe activation of the first virtual computer if the setting forprohibiting the activation is set to be valid.
 10. The virtual computersystem according to claim 9, wherein the virtualization mechanismincludes a virtual computer activation unit for executing the firstjudgment and the second judgment.
 11. The virtual computer systemaccording to claim 9, wherein the first information corresponds to thesetting for prohibiting activation of the first virtual computer. 12.The virtual computer system according to claim 9, wherein thevirtualization mechanism includes: a management table for storing acorrespondence between the identifier and the logic I/O adapter deviceassigned to the first virtual computer; and a virtual computeractivation unit for executing the second judgment for checking theidentifier corresponding to the logic I/O adaptor device assigned to thefirst virtual computer based on the management table when the firstvirtual computer is activated, and for prohibiting the activation of thefirst virtual computer when the identifier is registered to be theinvalid identifier.
 13. The virtual computer system according to claim9, wherein a world wide name (WWN), which is registered incorrespondence with the logic I/O adapter device, is used as theidentifier.
 14. The virtual computer system according to claim 9,wherein, in the first judgment, if the first virtual computer isprohibited then the first virtual computer is not activated, and if thefirst virtual computer is not prohibited then the second judgment isexecuted; and wherein, in the second judgment, if the identifierincluded in the logic I/O adapter device to which the first virtualcomputer is assigned is invalid then the first virtual computer is notactivated, and if the identifier included in the logic I/O adapterdevice to which the first virtual computer is assigned is not invalid,then the first virtual computer is activated.
 15. The virtual computersystem according to claim 9, wherein the logic I/O adapter device is avirtual HBA or a virtual NIC; and wherein the identifier included in thelogic I/O adapter device is a world wide name (WWN).
 16. The virtualcomputer system according to claim 9, wherein the at least one virtualcomputer includes at least the first virtual computer and a secondvirtual computer.
 17. A virtual computer system comprising a pluralityof computers for executing a program and a storage system connected tothe computers via a network, wherein a virtualization mechanism in afirst computer of the plurality of computers generates a plurality ofvirtual computers to which a physical CPU and a physical memory of thefirst computer are divided and assigned, wherein the virtualizationmechanism in a first virtual computer of the plurality of virtualcomputers generated on the first computer executes at least one of afirst judgment and a second judgment when a request for activating thefirst virtual computer is received, wherein the first judgment is forjudging whether or not the activation of the first virtual computer isprohibited based on first information stored in a memory of thevirtualization mechanism, wherein the second judgment is for judgingwhether or not an identifier included in a logic I/O adapter deviceassigned to the first virtual computer is invalid based on secondinformation stored in the memory of the virtualization mechanism,wherein the activation of the first virtual computer is permitted orprohibited based on the executed at least one of the first judgment andthe second judgment in response to the request for activating the firstvirtual computer, and wherein the virtualization mechanism includes: amanagement table for storing a correspondence between the first virtualcomputer and a setting for prohibiting activation of the first virtualcomputer, the setting being either valid or invalid, and a virtualcomputer activation unit for executing the first judgment for checkingthe setting for prohibiting activation of the first virtual computerbased on the management table when the virtual mechanism accepts anactivation request for the first virtual computer, and for prohibitingthe activation of the first virtual computer if the setting forprohibiting the activation is set to be valid.