CN101202078B - Data protection method - Google Patents

Data protection method Download PDF

Info

Publication number
CN101202078B
CN101202078B CN2006101670078A CN200610167007A CN101202078B CN 101202078 B CN101202078 B CN 101202078B CN 2006101670078 A CN2006101670078 A CN 2006101670078A CN 200610167007 A CN200610167007 A CN 200610167007A CN 101202078 B CN101202078 B CN 101202078B
Authority
CN
China
Prior art keywords
storage block
block
periphery
data
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2006101670078A
Other languages
Chinese (zh)
Other versions
CN101202078A (en
Inventor
陈志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiaxing Jinxu Medical Technology Co., Ltd.
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to CN2006101670078A priority Critical patent/CN101202078B/en
Publication of CN101202078A publication Critical patent/CN101202078A/en
Application granted granted Critical
Publication of CN101202078B publication Critical patent/CN101202078B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a data protection method, which is applied in a data processing system provided with a storage device. When a damaged storage block existing in the storage device is read by the data processing system, the method firstly finds out storage blocks around the damaged storage block and sequentially judges whether the storage blocks around are damaged storage blocks; if the storage blocks are not damaged storage blocks, the method then judges whether the storage blocks around are in an unused state; if the storage blocks around are indeed in an unused state, the storage blocks are set in a used state; if the storage blocks around are in a used state, then unused storage blocks in the storage device are searched out, and data in the storage blocks around are copied into the unused storage blocks, and the unused storage blocks are set in a used state, and finally, index of a document block of the storage block around in the data processing system is revised to point at the unused storage blocks, thereby direct reading the data in the unused storage block through the index of the document block when the data processing system is running.

Description

Data guard method
Technical field
The present invention relates to a kind of data guard method; in more detail; relate to and a kind ofly be applied to have in the data handling system of storage device; storage block in order to the storage block periphery avoiding damaging is follow-up because of damage causes the loss of data, and avoids data to deposit the data guard method of the data guard method in the storage block that damages the high periphery of probability in.
Background technology
Usually, after hard disc (HDD) uses for a long time, just various problems might appear, and hard disc " bad rail " (that is, the storage block that damages) be this wherein modal problem, bad rail of hard disc is divided into two kinds on bad rail of logic and bad rail of physics again, and the former is soft bad rail, be generally that software operation or improper use cause, the available software reparation; The latter is real bad rail of physical property, and it shows on the hard disc track and has produced physical damnification, can only solve by the operating position of change hard disk partition or magnetic region.
Yet, hard disc is when operation, if there is the storage block of damage to exist, then the storage block of the storage block periphery of Sun Huaiing produces the probability system that damages and stores block greater than other in follow-up operation, therefore, if the repair of the storage block that the user does not in time damage, or in time the data in the hard disc are not backed up, then can in follow-up operation, produce at the storage block of the storage block periphery that damages damage in, cause the generation of the data loss in the storage block of this periphery, relatively, then can cause user's puzzlement, in addition, inevitably, the user and can't be optionally with deposit data in some stores block, therefore, if before the storage block of the storage block periphery that damages damaged as yet, when having data to deposit the storage block of this periphery in, then the possibility of data loss heightened.
Like this; how to provide a kind of and can solve above-mentioned prior art problems; the follow-up loss that causes data because of damage of storage block with the storage block periphery avoiding damaging; and avoid data to deposit in damaging the data guard method in the storage block of the high periphery of probability, problem demanding prompt solution in the real field for this reason.
Summary of the invention
In view of the disappearance of above-mentioned prior art, fundamental purpose of the present invention is to provide a kind of data guard method, with the follow-up loss that causes data because of damage of storage block of the storage block periphery avoiding damaging.
Another object of the present invention is to provide a kind of data guard method, deposit in the storage block that damages the high periphery of probability to avoid data.
For reaching above-mentioned main and another purpose, data guard method of the present invention is applied to have in the data handling system of storage device, this data guard method may further comprise the steps: (1) this data handling system reads this storage device when the storage block of damage is arranged, and finds out the storage block of the storage block periphery of this damage; (2) the storage block of judging this periphery in regular turn also storage block whether for damaging, if, then finish this data guard method, if not, then proceed to step (3); (3) whether the storage block of distinguishing this periphery is unused state, if, then proceed to step (4), if not, then proceed to step (5); (4) the storage block of setting this periphery is user mode, and finishes this data guard method; (5) hunt out untapped storage block in this storage device, and duplicate data in the storage block of this periphery, and this untapped storage block of setting is user mode to this untapped storage block; And (6) should periphery in this data handling system the file block index (i-node) of storage block be revised as this untapped storage block of sensing, thereby in when operation, can be directly read data in this untapped storage block by this document block index for this data handling system.
In the data guard method preferred embodiment of the present invention, this storage device is hard disc (HDD); This data handling system is one of them of computer system and server system; This step (1) is found out the storage block of the storage block periphery of this damage by the mode of searching the hard disc track; This step (3) uses the mode of the user mode field in the table to distinguish whether the storage block of this periphery is unused state by checking the file system block; This step (4) is set this periphery by the mode of the user mode field in the enactment document system block use table storage block is user mode; This step (5) hunts out untapped storage block in this storage device by the mode of checking the user mode field in the file system block use table; This step (5) is set this untapped storage block by the mode of the user mode field in the enactment document system block use table and is user mode; The mode of the disk block address in the file block index of the storage block of this step (6) by being modified in this periphery should periphery the file block index of storage block be revised as this untapped storage block of sensing, in when operation, can be directly read data in this untapped storage block for this data handling system by the disk block address in this document block index.
Than prior art; data guard method of the present invention mainly reads this storage device when the storage block of damage is arranged in this data handling system; find out the storage block of the storage block periphery of this damage earlier; then; whether the storage block of judging this periphery in regular turn also is the storage block that damages; if not be the storage block that damages; whether the storage block of then distinguishing this periphery further is unused state; if picking out the storage block of this periphery is unused state; the storage block of then setting this periphery is user mode; if the storage block that picks out this periphery is user mode; then hunt out untapped storage block in this storage device; and the interior data of the storage block that duplicates this periphery arrive this untapped storage block; and set this untapped storage block and be user mode; the file block index (i-node) of last storage block that again should periphery in this data handling system is revised as this untapped storage block of sensing; thereby supply this data handling system when operation; can be directly read data in this untapped storage block by this document block index; thus; not only can in follow-up operation, produce when damaging at the storage block of the storage block periphery that damages; protection has been stored in the interior data of storage block of this periphery; also can avoid simultaneously follow-up data to deposit in the storage block that damages the high periphery of probability, thereby reach all above-mentioned purposes.
Description of drawings
Fig. 1 is the embodiment steps flow chart synoptic diagram of data guard method of the present invention.
The main element symbol description
S10 to S15 step
Embodiment
Below by specific instantiation explanation embodiments of the present invention, those skilled in the art can understand other advantages of the present invention and effect easily by this instructions institute disclosure.The present invention also can be implemented or be used by other different instantiations, and the every details in this instructions also can be based on different viewpoints and application, carries out various modifications and change under the spirit of the present invention not deviating from.
See also Fig. 1, it is for the embodiment steps flow chart synoptic diagram of data guard method of the present invention.This data guard method is applied to have in the data handling system of storage device, and in the present embodiment, this storage device is hard disc (HDD), and this data handling system is the data handling system that computer system or server system etc. have storage device.As shown in Figure 1, this data guard method execution in step S10 to S13.
Below promptly be elaborated at each step of data guard method of the present invention respectively:
In step S10, this data handling system reads this storage device when the storage block of damage is arranged, and finds out the storage block of the storage block periphery of this damage.In the present embodiment, this step S10 finds out the storage block of the storage block periphery of this damage by the mode of searching the hard disc track, and the quantity of storage block that should periphery be 8 (with the notion of planimetric map, the storage block of this periphery lays respectively on the storage block of this damage, down, a left side, right, upper left, upper right, lower-left and lower right), but be not as limit, during actual enforcement, also can carry out the increase and decrease of quantity on demand, (with the notion of planimetric map, the storage block of this periphery lays respectively on the storage block of this damage for example to be 4, down, a left side, right-hand).
In step S11, judge in regular turn whether the storage block of this periphery also is the storage block that damages.In the present embodiment; whether the storage block of judging these 8 peripheries one by one also is the storage block that damages; if; that is the storage block of these 8 peripheries is all the storage block of damage, then finishes data guard method of the present invention; if not; that is, have a certain in the storage block of these 8 peripheries or some stores block for damage, then proceed to step S12.
In step S12, distinguish whether the storage block of this periphery is unused state.In the present embodiment, this step S12 uses the mode of the user mode field in the table to distinguish whether the storage block of this periphery is unused state by checking the file system block, that is, carry out distinguishing of user mode at storage block by the mode of checking the user mode field in the file system block use table by each unspoiled periphery of being judged among the step S11, if the result that distinguishes of the storage block of this unspoiled periphery is a unused state, then proceed to step S13, otherwise, if the result that distinguishes of the storage block of this unspoiled periphery is user mode, then proceed to step S14.
In step S13, the storage block of setting this periphery is user mode.In the present embodiment, this step S13 sets this periphery by the mode of the user mode field in the enactment document system block use table storage block is user mode, that is, in file system block use table, the user mode field of the storage block of distinguishing the unspoiled periphery that is unused state among the result among the step S12 is changed into user mode, its purpose can't be stored in follow-up new data in the storage block of this unspoiled periphery that is unused state for making this data handling system when the follow-up operation.
In step S14, hunt out untapped storage block in this storage device, and duplicate data in the storage block of this periphery, and this untapped storage block of setting is user mode to this untapped storage block.In the present embodiment, this step S14 hunts out untapped storage block in this storage device by the mode of checking the user mode field in the file system block use table, and set this untapped storage block by the mode of the user mode field in the enactment document system block use table and be user mode, that is, the data that distinguishing among the step S12 are among the result in the storage block of the unspoiled periphery of user mode backup in other untapped storage blocks, and the user mode that will back up other untapped storage blocks of data is changed into user mode, its purpose is for backing up the data in the storage block that has deposited unspoiled periphery in, and can be during at follow-up operation in this data handling system, unlikely follow-up new data is stored in these other untapped storage blocks that backed up data, and this moment, distinguishing among the step S12 is among the result user mode of the storage block of the unspoiled periphery of user mode is not changed (still for user mode), correspondingly, this data handling system also can't be stored in follow-up new data in this storage block that is the unspoiled periphery of user mode when follow-up operation.Then proceed to step S15.
In step S15, the file block index (i-node) of storage block that should periphery in this data handling system is revised as this untapped storage block of sensing, thereby in when operation, can be directly read data in this untapped storage block by this document block index for this data handling system.In general, the information that is write down in the file block index comprises: file size, user ID (User ID), the ID of group (Group ID), the file access pattern, link counting, last modification time of file and disk block address, and in the present embodiment, this step S15 by modification should periphery the file block index of storage block in the mode of disk block address should periphery the file block index of storage block be revised as this untapped storage block of sensing, that is, only point to the file block index that the Data Source person (being the storage block of the unspoiled periphery of user mode) who carries out data backup is arranged among the step S14 at having, its disk block address contents is revised as sensing data backup purpose person (the storage block of the unspoiled periphery that is hunted out), in when operation, can be directly read data in this untapped storage block for this data handling system by the disk block address in this document block index.
In sum; data guard method of the present invention mainly reads this storage device when the storage block of damage is arranged in this data handling system; find out the storage block of the storage block periphery of this damage earlier; then; whether the storage block of judging this periphery in regular turn also is the storage block that damages; if not be the storage block that damages; whether the storage block of then distinguishing this periphery further is unused state; if picking out the storage block of this periphery is unused state; the storage block of then setting this periphery is user mode; if the storage block that picks out this periphery is user mode; then hunt out untapped storage block in this storage device; and duplicate data in the storage block of this periphery to this untapped storage block; and set this untapped storage block and be user mode; the file block index of last storage block that again should periphery in this data handling system is revised as this untapped storage block of sensing; thereby supply this data handling system when operation; can be directly read data in this untapped storage block by this document block index; thus; not only can in follow-up operation, produce when damaging at the storage block of the storage block periphery that damages; protection has been stored in the interior data of storage block of this periphery, also can avoid follow-up data to deposit in the storage block that damages the high periphery of probability simultaneously.
The foregoing description is illustrative principle of the present invention and effect thereof only, but not is used to limit the present invention.Any those skilled in the art all can be under spirit of the present invention and category, and the foregoing description is modified and changed.Therefore, the scope of the present invention, claim that should be as described is listed.

Claims (2)

1. a data guard method is applied to have in the data handling system of hard disc, and this data guard method may further comprise the steps:
1) this data handling system reads this hard disc when the storage block of damage is arranged, and finds out the storage block of the storage block periphery of this damage by the mode of searching the hard disc track;
2) the storage block of judging this periphery in regular turn also storage block whether for damaging, if, then finish this data guard method, if not, then proceed to step 3);
3) use the mode of the user mode field in the table to distinguish whether the storage block of this periphery is unused state by inspection file system block, if, then proceed to step 4), if not, then proceed to step 5);
4) the storage block of setting this periphery by the mode of the user mode field in the enactment document system block use table is user mode, and finishes this data guard method;
5) hunt out untapped storage block in this hard disc by the mode of checking the user mode field in the file system block use table, and duplicate data in the storage block of this periphery, and set this untapped storage block by the mode of the user mode field in the enactment document system block use table and be user mode to this untapped storage block; And
6) mode by revising the disk block address in the file block index of the storage block of described periphery in this data handling system is revised as the file block index of the storage block of described periphery and points to described untapped storage block, in when operation, can be directly read data in the described untapped storage block for described data handling system by the disk block address in the described file block index.
2. data guard method according to claim 1, wherein, described data handling system is a server system.
CN2006101670078A 2006-12-12 2006-12-12 Data protection method Expired - Fee Related CN101202078B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006101670078A CN101202078B (en) 2006-12-12 2006-12-12 Data protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006101670078A CN101202078B (en) 2006-12-12 2006-12-12 Data protection method

Publications (2)

Publication Number Publication Date
CN101202078A CN101202078A (en) 2008-06-18
CN101202078B true CN101202078B (en) 2010-12-22

Family

ID=39517191

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006101670078A Expired - Fee Related CN101202078B (en) 2006-12-12 2006-12-12 Data protection method

Country Status (1)

Country Link
CN (1) CN101202078B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1503224A (en) * 2002-11-22 2004-06-09 华为技术有限公司 Read-write operation method in multi-disc failure in five-grade independent redundant disc array
US6880053B2 (en) * 2002-12-19 2005-04-12 Veritas Operating Corporation Instant refresh of a data volume copy
CN1866226A (en) * 2005-05-17 2006-11-22 英业达股份有限公司 Data protection method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1503224A (en) * 2002-11-22 2004-06-09 华为技术有限公司 Read-write operation method in multi-disc failure in five-grade independent redundant disc array
US6880053B2 (en) * 2002-12-19 2005-04-12 Veritas Operating Corporation Instant refresh of a data volume copy
CN1866226A (en) * 2005-05-17 2006-11-22 英业达股份有限公司 Data protection method

Also Published As

Publication number Publication date
CN101202078A (en) 2008-06-18

Similar Documents

Publication Publication Date Title
CN106201338B (en) Date storage method and device
CN102012852B (en) Method for implementing incremental snapshots-on-write
WO2016086819A1 (en) Method and apparatus for writing data into shingled magnetic record smr hard disk
CN102096561B (en) Hierarchical data storage processing method, device and storage equipment
CN102722536B (en) Method and device for realizing snapshot based on distributed file system
CN103034592B (en) Data processing method and device
US20160034487A1 (en) Selective fragmentation repair
CN110096227A (en) Date storage method, data processing method, device, electronic equipment and computer-readable medium
CN105573859A (en) Data recovery method and device of database
CN106919477B (en) Virtual disk analysis method and system
JP6805816B2 (en) Information processing equipment, information processing system, information processing method and program
CN107315616A (en) A kind of loading method of firmware, device and electronic equipment
CN100437504C (en) Hard disc data backup system and method
CN105787037A (en) Repeated data deleting method and device
CN109496292A (en) A kind of disk management method, disk management device and electronic equipment
CN103617260A (en) Index generation method and device for repeated data deletion
CN105302665A (en) Improved copy-on-write snapshot method and system
WO2017143843A1 (en) Metadata recovery method and device
CN103559139A (en) Data storage method and device
CN110187834B (en) Data processing method and device for duplicate copies and electronic equipment
CN102096613A (en) Method and device for generating snapshot
CN103699681B (en) The treating method and apparatus of data rewind
CN103617135B (en) The method and device of digital independent in a kind of storage device
CN101202078B (en) Data protection method
CN106354828A (en) Data fragmentation method and device for distributed database

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20181128

Address after: Building 1, No. 231 Jiulong Road, Caoqiao Street, Pinghu City, Jiaxing City, Zhejiang Province

Patentee after: Jiaxing Jinxu Medical Technology Co., Ltd.

Address before: Taipei City, Taiwan, China

Patentee before: Inventec Corporation

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20101222

Termination date: 20181212

CF01 Termination of patent right due to non-payment of annual fee