CN101202077B - Data protection method - Google Patents

Data protection method Download PDF

Info

Publication number
CN101202077B
CN101202077B CN2006101656954A CN200610165695A CN101202077B CN 101202077 B CN101202077 B CN 101202077B CN 2006101656954 A CN2006101656954 A CN 2006101656954A CN 200610165695 A CN200610165695 A CN 200610165695A CN 101202077 B CN101202077 B CN 101202077B
Authority
CN
China
Prior art keywords
storage block
periphery
data
block
untapped
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2006101656954A
Other languages
Chinese (zh)
Other versions
CN101202077A (en
Inventor
陈志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiaxing Jinxu Medical Technology Co., Ltd.
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to CN2006101656954A priority Critical patent/CN101202077B/en
Publication of CN101202077A publication Critical patent/CN101202077A/en
Application granted granted Critical
Publication of CN101202077B publication Critical patent/CN101202077B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to a data protection method which is applied in a data processing system provided with a storage device. When a damaged storage block existing in the storage device is read by the data processing system, the method finds out storage blocks around the damaged storage block and sequentially judges whether the storage blocks around are also damaged storage blocks; if the storage blocks are not damaged storage blocks, the method then judges whether the storage blocks around are in an unused state; if the storage blocks around are indeed in an unused state, the storage blocks are set in a used state; if the storage blocks around are in a used state, then unused storage blocks in the storage device are searched out, and data in the storage blocks around are copied into the unused storage blocks, then the unused storage blocks are set in a used state, and finally, corresponding relationship between the storage blocks around and the unused storage blocks is established in the data processing system, thereby facilitating reading of the data in the unused storage blocks by the data processing system when reading the storage blocks around through the corresponding relationship established.

Description

Data guard method
Technical field
The present invention relates to a kind of data guard method; in more detail; relate to and a kind ofly be applied to have in the data handling system of storage device; storage block in order to the storage block periphery avoiding damaging is follow-up because of damage causes the loss of data, and avoids data to deposit the data guard method of the data guard method in the storage block that damages the high periphery of probability in.
Background technology
Usually, after hard disc (HDD) uses for a long time, just various problems might appear, and hard disc " bad rail " (that is, the storage block that damages) be this wherein modal problem, bad rail of hard disc is divided into two kinds on bad rail of logic and bad rail of physics again, and the former is soft bad rail, be generally that software operation or improper use cause, the available software reparation; The latter is real bad rail of physical property, and it shows on the hard disc track and has produced physical damnification, can only solve by the operating position of change hard disk partition or magnetic region.
Yet, hard disc is when operation, if there is the storage block of damage to exist, then the storage block of the storage block periphery of Sun Huaiing produces the probability of damaging and stores block greater than other in follow-up operation, therefore, if the repair of the storage block that the user does not in time damage, or in time the data in the hard disc are not backed up, then can produce in follow-up operation at the storage block of the storage block periphery that damages in the damage, cause the interior data of storage block of this periphery to lose generation, relatively, then can cause user's puzzlement, in addition, inevitably, the user and can't be optionally with deposit data in some stores block, therefore, if before the storage block of the storage block periphery that damages damages as yet, when having data to deposit the storage block of this periphery in, then the possibility system of data loss heightens.
Therefore; how to provide a kind of and can solve above-mentioned prior art problems; the follow-up loss that causes data because of damage of storage block with the storage block periphery avoiding damaging; and avoid data to deposit in damaging the data guard method in the storage block of the high periphery of probability, problem demanding prompt solution in the real field for this reason.
Summary of the invention
In view of the disappearance of above-mentioned prior art, fundamental purpose of the present invention is to provide a kind of data guard method, with the follow-up loss that causes data because of damage of storage block of the storage block periphery avoiding damaging.
Another object of the present invention is to provide a kind of data guard method, deposit in the storage block that damages the high periphery of probability to avoid data.
For reaching above-mentioned main and another purpose, data guard method of the present invention is applied to have in the data handling system of storage device, this data guard method may further comprise the steps: (1) this data handling system reads this storage device when the storage block of damage is arranged, and finds out the storage block of the storage block periphery of this damage; (2) the storage block of judging this periphery in regular turn also storage block whether for damaging, if, then finish this data guard method, if not, then proceed to step (3); (3) whether the storage block of distinguishing this periphery is unused state, if, then proceed to step (4), if not, then proceed to step (5); (4) the storage block of setting this periphery is user mode, and finishes this data guard method; (5) hunt out untapped storage block in this storage device, and duplicate data in the storage block of this periphery, and this untapped storage block of setting is user mode to this untapped storage block; And (6) set up the storage block of this periphery and the corresponding relation of this untapped storage block in this data handling system, thereby when reading the storage block of this periphery, the corresponding relation that can pass through to be set up reads the data in this untapped storage block for this data handling system.
In the data guard method preferred embodiment of the present invention, this storage device is hard disc (HDD); This data handling system is a server system; This step (1) is found out the storage block of the storage block periphery of this damage by the mode of searching the hard disc track; This step (3) uses the mode of the user mode field in the table to distinguish whether the storage block of this periphery is unused state by checking the file system block; This step (4) is set this periphery by the mode of the user mode field in the enactment document system block use table storage block is user mode; This step (5) hunts out untapped storage block in this storage device by the mode of checking the user mode field in the file system block use table; This step (5) is set this untapped storage block by the mode of the user mode field in the enactment document system block use table and is user mode; This step (6) is set up the storage block of this periphery and the corresponding relation of this untapped storage block by the storage block of setting up this periphery in this data handling system with the mode of this untapped storage block corresponding tables, when reading the storage block of this periphery, read the data in this untapped storage block in the storage block that can pass through this periphery of being set up and this untapped storage block corresponding tables for this data handling system.
Than prior art; data guard method of the present invention mainly reads this storage device when the storage block of damage is arranged in this data handling system; find out the storage block of the storage block periphery of this damage earlier; then; whether the storage block of judging this periphery in regular turn also is the storage block that damages; if not be the storage block that damages; whether the storage block of then distinguishing this periphery further is unused state; if picking out the storage block of this periphery is unused state; the storage block of then setting this periphery is user mode; if the storage block that picks out this periphery is user mode; then hunt out untapped storage block in this storage device; and duplicate data in the storage block of this periphery to this untapped storage block; and set this untapped storage block and be user mode; the last storage block of this periphery and the corresponding relation of this untapped storage block in this data handling system, set up again; thereby when reading the storage block of this periphery for this data handling system; the corresponding relation that can pass through to be set up reads the data in this untapped storage block; thus; not only can in follow-up operation, produce when damaging at the storage block of the storage block periphery that damages; protection has been stored in the interior data of storage block of this periphery; also can avoid simultaneously follow-up data to deposit in the storage block that damages the high periphery of probability, thereby reach all above-mentioned purposes.
Description of drawings
Fig. 1 is the embodiment steps flow chart synoptic diagram of data guard method of the present invention.
The main element symbol description
S10 to S15 step
Embodiment
Below by specific instantiation explanation embodiments of the present invention, those skilled in the art can understand other advantages of the present invention and effect easily by this instructions institute disclosure.The present invention also can be implemented or be used by other different instantiations, and the every details in this instructions also can be based on different viewpoints and application, carries out various modifications and change under the spirit of the present invention not deviating from.
See also Fig. 1, be the embodiment steps flow chart synoptic diagram of data guard method of the present invention.This data guard method is applied to have in the data handling system of storage device, and in the present embodiment, this storage device is hard disc (HDD), and this data handling system is the data handling system that server system etc. has storage device.As shown in Figure 1, this data guard method execution in step S10 to S13.
Below promptly be elaborated at each step of data guard method of the present invention respectively:
In step S10, this data handling system reads this storage device when the storage block of damage is arranged, and finds out the storage block of the storage block periphery of this damage.In the present embodiment, this step S10 finds out the storage block of the storage block periphery of this damage by the mode of searching the hard disc track, and the quantity of storage block that should periphery be 8 (with the notion of planimetric map, the storage block of this periphery lays respectively on the storage block of this damage, down, a left side, right, upper left, upper right, lower-left and lower right), but be not as limit, during actual enforcement, also can carry out the increase and decrease of quantity on demand, (with the notion of planimetric map, the storage block of this periphery lays respectively on the storage block of this damage for example to be 4, down, a left side, right-hand).
In step S11, judge in regular turn whether the storage block of this periphery also is the storage block that damages.In the present embodiment; whether the storage block of judging these 8 peripheries one by one also is the storage block that damages; if; that is the storage block of these 8 peripheries is all the storage block of damage, then finishes data guard method of the present invention; if not; that is, have a certain in the storage block of these 8 peripheries or some stores block for damage, then proceed to step S12.
In step S12, distinguish whether the storage block of this periphery is unused state.In the present embodiment, this step S12 uses the mode of the user mode field in the table to distinguish whether the storage block of this periphery is unused state by checking the file system block, that is, carry out distinguishing of user mode at storage block by the mode of checking the user mode field in the file system block use table by each unspoiled periphery of being judged among the step S11, if the result that distinguishes of the storage block of this unspoiled periphery is a unused state, then proceed to step S13, otherwise, if the result that distinguishes of the storage block of this unspoiled periphery is user mode, then proceed to step S14.
In step S13, the storage block of setting this periphery is user mode.In the present embodiment, this step S13 sets this periphery by the mode of the user mode field in the enactment document system block use table storage block is user mode, that is, in file system block use table, the user mode field of the storage block of distinguishing the unspoiled periphery that is unused state among the result among the step S12 is changed into user mode, its purpose can't be stored in follow-up new data in the storage block of this unspoiled periphery that is unused state for making this data handling system when the follow-up operation.
In step S14, hunt out untapped storage block in this storage device, and duplicate data in the storage block of this periphery, and this untapped storage block of setting is user mode to this untapped storage block.In the present embodiment, this step S14 hunts out untapped storage block in this storage device by the mode of checking the user mode field in the file system block use table, and set this untapped storage block by the mode of the user mode field in the enactment document system block use table and be user mode, that is, the data that distinguishing among the step S12 are among the result in the storage block of the unspoiled periphery of user mode backup in other untapped storage blocks, and the user mode that will back up other untapped storage blocks of data is changed into user mode, its purpose is for backing up the data in the storage block that has deposited unspoiled periphery in, and can be during at follow-up operation in this data handling system, unlikely follow-up new data is stored in these other untapped storage blocks that backed up data, and this moment, distinguishing among the step S12 is among the result user mode of the storage block of the unspoiled periphery of user mode is not changed (still for user mode), correspondingly, this data handling system also can't be stored in follow-up new data in this storage block that is the unspoiled periphery of user mode when follow-up operation.Then proceed to step S15.
In step S15, in this data handling system, set up the storage block of this periphery and the corresponding relation of this untapped storage block, thereby when reading the storage block of this periphery for this data handling system, the corresponding relation that can pass through to be set up reads the data in this untapped storage block.In the present embodiment, this step S15 sets up the storage block of this periphery and the corresponding relation of this untapped storage block by the storage block of setting up this periphery in this data handling system with the mode of this untapped storage block corresponding tables, that is, in the storage block of this periphery and this untapped storage block corresponding tables only at the Data Source (being the storage block of the unspoiled periphery of user mode) that carries out data backup is arranged among the step S14, and data backup purpose (the storage block of the unspoiled periphery that is hunted out) is set up corresponding relation, when reading the storage block of this periphery, read the data in this untapped storage block in the storage block that can pass through this periphery of being set up and this untapped storage block corresponding tables for this data handling system.
In sum; data guard method of the present invention mainly reads this storage device when the storage block of damage is arranged in this data handling system; find out the storage block of the storage block periphery of this damage earlier; then; whether the storage block of judging this periphery in regular turn also is the storage block that damages; if not be the storage block that damages; whether the storage block of then distinguishing this periphery further is unused state; if picking out the storage block of this periphery is unused state; the storage block of then setting this periphery is user mode; if the storage block that picks out this periphery is user mode; then hunt out untapped storage block in this storage device; and duplicate data in the storage block of this periphery to this untapped storage block; and set this untapped storage block and be user mode; the last storage block of this periphery and the corresponding relation of this untapped storage block in this data handling system, set up again; thereby when reading the storage block of this periphery for this data handling system; the corresponding relation that can pass through to be set up reads the data in this untapped storage block; thus; not only can in follow-up operation, produce when damaging at the storage block of the storage block periphery that damages; protection has been stored in the interior data of storage block of this periphery, also can avoid follow-up data to deposit in the storage block that damages the high periphery of probability simultaneously.
The foregoing description is illustrative principle of the present invention and effect thereof only, but not is used to limit the present invention.Any those skilled in the art all can be under spirit of the present invention and category, and the foregoing description is modified and changed.Therefore, the scope of the present invention, claim that should be as described is listed.

Claims (2)

1. a data guard method is applied to have in the data handling system of hard disc, and described data guard method may further comprise the steps:
1) described data handling system reads described hard disc when the storage block of damage is arranged, and by searching the mode of hard disc track, finds out the storage block of the storage block periphery of described damage;
2) the storage block of judging described periphery in regular turn also storage block whether for damaging, if, then finish described data guard method, if not, then proceed to step 3);
3) use the mode of the user mode field in the table to distinguish whether the storage block of described periphery is unused state by inspection file system block, if, then proceed to step 4), if not, then proceed to step 5);
4) the storage block of setting described periphery by the mode of the user mode field in the enactment document system block use table is user mode, and finishes described data guard method;
5) hunt out untapped storage block in the described hard disc by the mode of checking the user mode field in the file system block use table, and duplicate data in the storage block of described periphery, and set described untapped storage block by the mode of the user mode field in the enactment document system block use table and be user mode to described untapped storage block; And
6) the storage block by setting up described periphery in described data handling system and the mode of described untapped storage block corresponding tables are set up the storage block of described periphery and the corresponding relation of described untapped storage block, when reading the storage block of described periphery, can pass through to read in the storage block of the described periphery set up and the described untapped storage block corresponding tables data in the described untapped storage block for described data handling system.
2. data guard method according to claim 1, wherein, described data handling system is a server system.
CN2006101656954A 2006-12-12 2006-12-12 Data protection method Expired - Fee Related CN101202077B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006101656954A CN101202077B (en) 2006-12-12 2006-12-12 Data protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006101656954A CN101202077B (en) 2006-12-12 2006-12-12 Data protection method

Publications (2)

Publication Number Publication Date
CN101202077A CN101202077A (en) 2008-06-18
CN101202077B true CN101202077B (en) 2010-12-01

Family

ID=39517190

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006101656954A Expired - Fee Related CN101202077B (en) 2006-12-12 2006-12-12 Data protection method

Country Status (1)

Country Link
CN (1) CN101202077B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1499486A (en) * 2002-11-07 2004-05-26 华为技术有限公司 Method for reconstructing array of magnetic discs
CN1503224A (en) * 2002-11-22 2004-06-09 华为技术有限公司 Read-write operation method in multi-disc failure in five-grade independent redundant disc array
US6880053B2 (en) * 2002-12-19 2005-04-12 Veritas Operating Corporation Instant refresh of a data volume copy

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1499486A (en) * 2002-11-07 2004-05-26 华为技术有限公司 Method for reconstructing array of magnetic discs
CN1503224A (en) * 2002-11-22 2004-06-09 华为技术有限公司 Read-write operation method in multi-disc failure in five-grade independent redundant disc array
US6880053B2 (en) * 2002-12-19 2005-04-12 Veritas Operating Corporation Instant refresh of a data volume copy

Also Published As

Publication number Publication date
CN101202077A (en) 2008-06-18

Similar Documents

Publication Publication Date Title
CN106201338B (en) Date storage method and device
CN102012852B (en) Method for implementing incremental snapshots-on-write
CN100530125C (en) Safety storage method for data
CN102096561B (en) Hierarchical data storage processing method, device and storage equipment
CN103246478B (en) A kind of based on the disc array system of software PLC support without packet type overall situation HotSpare disk
US9665587B2 (en) Selective fragmentation repair
CN103034592B (en) Data processing method and device
CN105573859A (en) Data recovery method and device of database
CN103631721A (en) Method and system for isolating bad blocks in internal storage
US10380356B2 (en) Operating system partition protecting system, protecting device, and terminal
US8954398B1 (en) Systems and methods for managing deduplication reference data
CN104461390A (en) Method and device for writing data into imbricate magnetic recording SMR hard disk
CN110096227A (en) Date storage method, data processing method, device, electronic equipment and computer-readable medium
CN107315616A (en) A kind of loading method of firmware, device and electronic equipment
US10324794B2 (en) Method for storage management and storage device
JP6805816B2 (en) Information processing equipment, information processing system, information processing method and program
WO2015176433A1 (en) Hard disk repairing method and device based on partition table
CN109496292A (en) A kind of disk management method, disk management device and electronic equipment
CN105022678A (en) Data backup method and apparatus for virtual machine
CN103559139A (en) Data storage method and device
CN103207816A (en) Linux system repairing method
CN105302665A (en) Improved copy-on-write snapshot method and system
CN105354102B (en) A kind of method and apparatus of file system maintenance and reparation
CN105808378A (en) Metadata restoration method and device
CN102096613A (en) Method and device for generating snapshot

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20181129

Address after: Building 1, No. 231 Jiulong Road, Caoqiao Street, Pinghu City, Jiaxing City, Zhejiang Province

Patentee after: Jiaxing Jinxu Medical Technology Co., Ltd.

Address before: Taipei City, Taiwan, China

Patentee before: Inventec Corporation

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20101201

Termination date: 20181212

CF01 Termination of patent right due to non-payment of annual fee