CN101202077B - Data protection method - Google Patents
Data protection method Download PDFInfo
- Publication number
- CN101202077B CN101202077B CN2006101656954A CN200610165695A CN101202077B CN 101202077 B CN101202077 B CN 101202077B CN 2006101656954 A CN2006101656954 A CN 2006101656954A CN 200610165695 A CN200610165695 A CN 200610165695A CN 101202077 B CN101202077 B CN 101202077B
- Authority
- CN
- China
- Prior art keywords
- storage block
- periphery
- data
- block
- untapped
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention relates to a data protection method which is applied in a data processing system provided with a storage device. When a damaged storage block existing in the storage device is read by the data processing system, the method finds out storage blocks around the damaged storage block and sequentially judges whether the storage blocks around are also damaged storage blocks; if the storage blocks are not damaged storage blocks, the method then judges whether the storage blocks around are in an unused state; if the storage blocks around are indeed in an unused state, the storage blocks are set in a used state; if the storage blocks around are in a used state, then unused storage blocks in the storage device are searched out, and data in the storage blocks around are copied into the unused storage blocks, then the unused storage blocks are set in a used state, and finally, corresponding relationship between the storage blocks around and the unused storage blocks is established in the data processing system, thereby facilitating reading of the data in the unused storage blocks by the data processing system when reading the storage blocks around through the corresponding relationship established.
Description
Technical field
The present invention relates to a kind of data guard method; in more detail; relate to and a kind ofly be applied to have in the data handling system of storage device; storage block in order to the storage block periphery avoiding damaging is follow-up because of damage causes the loss of data, and avoids data to deposit the data guard method of the data guard method in the storage block that damages the high periphery of probability in.
Background technology
Usually, after hard disc (HDD) uses for a long time, just various problems might appear, and hard disc " bad rail " (that is, the storage block that damages) be this wherein modal problem, bad rail of hard disc is divided into two kinds on bad rail of logic and bad rail of physics again, and the former is soft bad rail, be generally that software operation or improper use cause, the available software reparation; The latter is real bad rail of physical property, and it shows on the hard disc track and has produced physical damnification, can only solve by the operating position of change hard disk partition or magnetic region.
Yet, hard disc is when operation, if there is the storage block of damage to exist, then the storage block of the storage block periphery of Sun Huaiing produces the probability of damaging and stores block greater than other in follow-up operation, therefore, if the repair of the storage block that the user does not in time damage, or in time the data in the hard disc are not backed up, then can produce in follow-up operation at the storage block of the storage block periphery that damages in the damage, cause the interior data of storage block of this periphery to lose generation, relatively, then can cause user's puzzlement, in addition, inevitably, the user and can't be optionally with deposit data in some stores block, therefore, if before the storage block of the storage block periphery that damages damages as yet, when having data to deposit the storage block of this periphery in, then the possibility system of data loss heightens.
Therefore; how to provide a kind of and can solve above-mentioned prior art problems; the follow-up loss that causes data because of damage of storage block with the storage block periphery avoiding damaging; and avoid data to deposit in damaging the data guard method in the storage block of the high periphery of probability, problem demanding prompt solution in the real field for this reason.
Summary of the invention
In view of the disappearance of above-mentioned prior art, fundamental purpose of the present invention is to provide a kind of data guard method, with the follow-up loss that causes data because of damage of storage block of the storage block periphery avoiding damaging.
Another object of the present invention is to provide a kind of data guard method, deposit in the storage block that damages the high periphery of probability to avoid data.
For reaching above-mentioned main and another purpose, data guard method of the present invention is applied to have in the data handling system of storage device, this data guard method may further comprise the steps: (1) this data handling system reads this storage device when the storage block of damage is arranged, and finds out the storage block of the storage block periphery of this damage; (2) the storage block of judging this periphery in regular turn also storage block whether for damaging, if, then finish this data guard method, if not, then proceed to step (3); (3) whether the storage block of distinguishing this periphery is unused state, if, then proceed to step (4), if not, then proceed to step (5); (4) the storage block of setting this periphery is user mode, and finishes this data guard method; (5) hunt out untapped storage block in this storage device, and duplicate data in the storage block of this periphery, and this untapped storage block of setting is user mode to this untapped storage block; And (6) set up the storage block of this periphery and the corresponding relation of this untapped storage block in this data handling system, thereby when reading the storage block of this periphery, the corresponding relation that can pass through to be set up reads the data in this untapped storage block for this data handling system.
In the data guard method preferred embodiment of the present invention, this storage device is hard disc (HDD); This data handling system is a server system; This step (1) is found out the storage block of the storage block periphery of this damage by the mode of searching the hard disc track; This step (3) uses the mode of the user mode field in the table to distinguish whether the storage block of this periphery is unused state by checking the file system block; This step (4) is set this periphery by the mode of the user mode field in the enactment document system block use table storage block is user mode; This step (5) hunts out untapped storage block in this storage device by the mode of checking the user mode field in the file system block use table; This step (5) is set this untapped storage block by the mode of the user mode field in the enactment document system block use table and is user mode; This step (6) is set up the storage block of this periphery and the corresponding relation of this untapped storage block by the storage block of setting up this periphery in this data handling system with the mode of this untapped storage block corresponding tables, when reading the storage block of this periphery, read the data in this untapped storage block in the storage block that can pass through this periphery of being set up and this untapped storage block corresponding tables for this data handling system.
Than prior art; data guard method of the present invention mainly reads this storage device when the storage block of damage is arranged in this data handling system; find out the storage block of the storage block periphery of this damage earlier; then; whether the storage block of judging this periphery in regular turn also is the storage block that damages; if not be the storage block that damages; whether the storage block of then distinguishing this periphery further is unused state; if picking out the storage block of this periphery is unused state; the storage block of then setting this periphery is user mode; if the storage block that picks out this periphery is user mode; then hunt out untapped storage block in this storage device; and duplicate data in the storage block of this periphery to this untapped storage block; and set this untapped storage block and be user mode; the last storage block of this periphery and the corresponding relation of this untapped storage block in this data handling system, set up again; thereby when reading the storage block of this periphery for this data handling system; the corresponding relation that can pass through to be set up reads the data in this untapped storage block; thus; not only can in follow-up operation, produce when damaging at the storage block of the storage block periphery that damages; protection has been stored in the interior data of storage block of this periphery; also can avoid simultaneously follow-up data to deposit in the storage block that damages the high periphery of probability, thereby reach all above-mentioned purposes.
Description of drawings
Fig. 1 is the embodiment steps flow chart synoptic diagram of data guard method of the present invention.
The main element symbol description
S10 to S15 step
Embodiment
Below by specific instantiation explanation embodiments of the present invention, those skilled in the art can understand other advantages of the present invention and effect easily by this instructions institute disclosure.The present invention also can be implemented or be used by other different instantiations, and the every details in this instructions also can be based on different viewpoints and application, carries out various modifications and change under the spirit of the present invention not deviating from.
See also Fig. 1, be the embodiment steps flow chart synoptic diagram of data guard method of the present invention.This data guard method is applied to have in the data handling system of storage device, and in the present embodiment, this storage device is hard disc (HDD), and this data handling system is the data handling system that server system etc. has storage device.As shown in Figure 1, this data guard method execution in step S10 to S13.
Below promptly be elaborated at each step of data guard method of the present invention respectively:
In step S10, this data handling system reads this storage device when the storage block of damage is arranged, and finds out the storage block of the storage block periphery of this damage.In the present embodiment, this step S10 finds out the storage block of the storage block periphery of this damage by the mode of searching the hard disc track, and the quantity of storage block that should periphery be 8 (with the notion of planimetric map, the storage block of this periphery lays respectively on the storage block of this damage, down, a left side, right, upper left, upper right, lower-left and lower right), but be not as limit, during actual enforcement, also can carry out the increase and decrease of quantity on demand, (with the notion of planimetric map, the storage block of this periphery lays respectively on the storage block of this damage for example to be 4, down, a left side, right-hand).
In step S11, judge in regular turn whether the storage block of this periphery also is the storage block that damages.In the present embodiment; whether the storage block of judging these 8 peripheries one by one also is the storage block that damages; if; that is the storage block of these 8 peripheries is all the storage block of damage, then finishes data guard method of the present invention; if not; that is, have a certain in the storage block of these 8 peripheries or some stores block for damage, then proceed to step S12.
In step S12, distinguish whether the storage block of this periphery is unused state.In the present embodiment, this step S12 uses the mode of the user mode field in the table to distinguish whether the storage block of this periphery is unused state by checking the file system block, that is, carry out distinguishing of user mode at storage block by the mode of checking the user mode field in the file system block use table by each unspoiled periphery of being judged among the step S11, if the result that distinguishes of the storage block of this unspoiled periphery is a unused state, then proceed to step S13, otherwise, if the result that distinguishes of the storage block of this unspoiled periphery is user mode, then proceed to step S14.
In step S13, the storage block of setting this periphery is user mode.In the present embodiment, this step S13 sets this periphery by the mode of the user mode field in the enactment document system block use table storage block is user mode, that is, in file system block use table, the user mode field of the storage block of distinguishing the unspoiled periphery that is unused state among the result among the step S12 is changed into user mode, its purpose can't be stored in follow-up new data in the storage block of this unspoiled periphery that is unused state for making this data handling system when the follow-up operation.
In step S14, hunt out untapped storage block in this storage device, and duplicate data in the storage block of this periphery, and this untapped storage block of setting is user mode to this untapped storage block.In the present embodiment, this step S14 hunts out untapped storage block in this storage device by the mode of checking the user mode field in the file system block use table, and set this untapped storage block by the mode of the user mode field in the enactment document system block use table and be user mode, that is, the data that distinguishing among the step S12 are among the result in the storage block of the unspoiled periphery of user mode backup in other untapped storage blocks, and the user mode that will back up other untapped storage blocks of data is changed into user mode, its purpose is for backing up the data in the storage block that has deposited unspoiled periphery in, and can be during at follow-up operation in this data handling system, unlikely follow-up new data is stored in these other untapped storage blocks that backed up data, and this moment, distinguishing among the step S12 is among the result user mode of the storage block of the unspoiled periphery of user mode is not changed (still for user mode), correspondingly, this data handling system also can't be stored in follow-up new data in this storage block that is the unspoiled periphery of user mode when follow-up operation.Then proceed to step S15.
In step S15, in this data handling system, set up the storage block of this periphery and the corresponding relation of this untapped storage block, thereby when reading the storage block of this periphery for this data handling system, the corresponding relation that can pass through to be set up reads the data in this untapped storage block.In the present embodiment, this step S15 sets up the storage block of this periphery and the corresponding relation of this untapped storage block by the storage block of setting up this periphery in this data handling system with the mode of this untapped storage block corresponding tables, that is, in the storage block of this periphery and this untapped storage block corresponding tables only at the Data Source (being the storage block of the unspoiled periphery of user mode) that carries out data backup is arranged among the step S14, and data backup purpose (the storage block of the unspoiled periphery that is hunted out) is set up corresponding relation, when reading the storage block of this periphery, read the data in this untapped storage block in the storage block that can pass through this periphery of being set up and this untapped storage block corresponding tables for this data handling system.
In sum; data guard method of the present invention mainly reads this storage device when the storage block of damage is arranged in this data handling system; find out the storage block of the storage block periphery of this damage earlier; then; whether the storage block of judging this periphery in regular turn also is the storage block that damages; if not be the storage block that damages; whether the storage block of then distinguishing this periphery further is unused state; if picking out the storage block of this periphery is unused state; the storage block of then setting this periphery is user mode; if the storage block that picks out this periphery is user mode; then hunt out untapped storage block in this storage device; and duplicate data in the storage block of this periphery to this untapped storage block; and set this untapped storage block and be user mode; the last storage block of this periphery and the corresponding relation of this untapped storage block in this data handling system, set up again; thereby when reading the storage block of this periphery for this data handling system; the corresponding relation that can pass through to be set up reads the data in this untapped storage block; thus; not only can in follow-up operation, produce when damaging at the storage block of the storage block periphery that damages; protection has been stored in the interior data of storage block of this periphery, also can avoid follow-up data to deposit in the storage block that damages the high periphery of probability simultaneously.
The foregoing description is illustrative principle of the present invention and effect thereof only, but not is used to limit the present invention.Any those skilled in the art all can be under spirit of the present invention and category, and the foregoing description is modified and changed.Therefore, the scope of the present invention, claim that should be as described is listed.
Claims (2)
1. a data guard method is applied to have in the data handling system of hard disc, and described data guard method may further comprise the steps:
1) described data handling system reads described hard disc when the storage block of damage is arranged, and by searching the mode of hard disc track, finds out the storage block of the storage block periphery of described damage;
2) the storage block of judging described periphery in regular turn also storage block whether for damaging, if, then finish described data guard method, if not, then proceed to step 3);
3) use the mode of the user mode field in the table to distinguish whether the storage block of described periphery is unused state by inspection file system block, if, then proceed to step 4), if not, then proceed to step 5);
4) the storage block of setting described periphery by the mode of the user mode field in the enactment document system block use table is user mode, and finishes described data guard method;
5) hunt out untapped storage block in the described hard disc by the mode of checking the user mode field in the file system block use table, and duplicate data in the storage block of described periphery, and set described untapped storage block by the mode of the user mode field in the enactment document system block use table and be user mode to described untapped storage block; And
6) the storage block by setting up described periphery in described data handling system and the mode of described untapped storage block corresponding tables are set up the storage block of described periphery and the corresponding relation of described untapped storage block, when reading the storage block of described periphery, can pass through to read in the storage block of the described periphery set up and the described untapped storage block corresponding tables data in the described untapped storage block for described data handling system.
2. data guard method according to claim 1, wherein, described data handling system is a server system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006101656954A CN101202077B (en) | 2006-12-12 | 2006-12-12 | Data protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006101656954A CN101202077B (en) | 2006-12-12 | 2006-12-12 | Data protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101202077A CN101202077A (en) | 2008-06-18 |
CN101202077B true CN101202077B (en) | 2010-12-01 |
Family
ID=39517190
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006101656954A Expired - Fee Related CN101202077B (en) | 2006-12-12 | 2006-12-12 | Data protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101202077B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1499486A (en) * | 2002-11-07 | 2004-05-26 | 华为技术有限公司 | Method for reconstructing array of magnetic discs |
CN1503224A (en) * | 2002-11-22 | 2004-06-09 | 华为技术有限公司 | Read-write operation method in multi-disc failure in five-grade independent redundant disc array |
US6880053B2 (en) * | 2002-12-19 | 2005-04-12 | Veritas Operating Corporation | Instant refresh of a data volume copy |
-
2006
- 2006-12-12 CN CN2006101656954A patent/CN101202077B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1499486A (en) * | 2002-11-07 | 2004-05-26 | 华为技术有限公司 | Method for reconstructing array of magnetic discs |
CN1503224A (en) * | 2002-11-22 | 2004-06-09 | 华为技术有限公司 | Read-write operation method in multi-disc failure in five-grade independent redundant disc array |
US6880053B2 (en) * | 2002-12-19 | 2005-04-12 | Veritas Operating Corporation | Instant refresh of a data volume copy |
Also Published As
Publication number | Publication date |
---|---|
CN101202077A (en) | 2008-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106201338B (en) | Date storage method and device | |
CN102012852B (en) | Method for implementing incremental snapshots-on-write | |
CN100530125C (en) | Safety storage method for data | |
CN102096561B (en) | Hierarchical data storage processing method, device and storage equipment | |
CN103246478B (en) | A kind of based on the disc array system of software PLC support without packet type overall situation HotSpare disk | |
US9665587B2 (en) | Selective fragmentation repair | |
CN103034592B (en) | Data processing method and device | |
CN105573859A (en) | Data recovery method and device of database | |
CN103631721A (en) | Method and system for isolating bad blocks in internal storage | |
US10380356B2 (en) | Operating system partition protecting system, protecting device, and terminal | |
US8954398B1 (en) | Systems and methods for managing deduplication reference data | |
CN104461390A (en) | Method and device for writing data into imbricate magnetic recording SMR hard disk | |
CN110096227A (en) | Date storage method, data processing method, device, electronic equipment and computer-readable medium | |
CN107315616A (en) | A kind of loading method of firmware, device and electronic equipment | |
US10324794B2 (en) | Method for storage management and storage device | |
JP6805816B2 (en) | Information processing equipment, information processing system, information processing method and program | |
WO2015176433A1 (en) | Hard disk repairing method and device based on partition table | |
CN109496292A (en) | A kind of disk management method, disk management device and electronic equipment | |
CN105022678A (en) | Data backup method and apparatus for virtual machine | |
CN103559139A (en) | Data storage method and device | |
CN103207816A (en) | Linux system repairing method | |
CN105302665A (en) | Improved copy-on-write snapshot method and system | |
CN105354102B (en) | A kind of method and apparatus of file system maintenance and reparation | |
CN105808378A (en) | Metadata restoration method and device | |
CN102096613A (en) | Method and device for generating snapshot |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20181129 Address after: Building 1, No. 231 Jiulong Road, Caoqiao Street, Pinghu City, Jiaxing City, Zhejiang Province Patentee after: Jiaxing Jinxu Medical Technology Co., Ltd. Address before: Taipei City, Taiwan, China Patentee before: Inventec Corporation |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20101201 Termination date: 20181212 |
|
CF01 | Termination of patent right due to non-payment of annual fee |