CN101202078B - Data protection method - Google Patents
Data protection method Download PDFInfo
- Publication number
- CN101202078B CN101202078B CN2006101670078A CN200610167007A CN101202078B CN 101202078 B CN101202078 B CN 101202078B CN 2006101670078 A CN2006101670078 A CN 2006101670078A CN 200610167007 A CN200610167007 A CN 200610167007A CN 101202078 B CN101202078 B CN 101202078B
- Authority
- CN
- China
- Prior art keywords
- storage block
- block
- periphery
- data
- storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a data protection method, which is applied in a data processing system provided with a storage device. When a damaged storage block existing in the storage device is read by the data processing system, the method firstly finds out storage blocks around the damaged storage block and sequentially judges whether the storage blocks around are damaged storage blocks; if the storage blocks are not damaged storage blocks, the method then judges whether the storage blocks around are in an unused state; if the storage blocks around are indeed in an unused state, the storage blocks are set in a used state; if the storage blocks around are in a used state, then unused storage blocks in the storage device are searched out, and data in the storage blocks around are copied into the unused storage blocks, and the unused storage blocks are set in a used state, and finally, index of a document block of the storage block around in the data processing system is revised to point at the unused storage blocks, thereby direct reading the data in the unused storage block through the index of the document block when the data processing system is running.
Description
Technical field
The present invention relates to a kind of data guard method; in more detail; relate to and a kind ofly be applied to have in the data handling system of storage device; storage block in order to the storage block periphery avoiding damaging is follow-up because of damage causes the loss of data, and avoids data to deposit the data guard method of the data guard method in the storage block that damages the high periphery of probability in.
Background technology
Usually, after hard disc (HDD) uses for a long time, just various problems might appear, and hard disc " bad rail " (that is, the storage block that damages) be this wherein modal problem, bad rail of hard disc is divided into two kinds on bad rail of logic and bad rail of physics again, and the former is soft bad rail, be generally that software operation or improper use cause, the available software reparation; The latter is real bad rail of physical property, and it shows on the hard disc track and has produced physical damnification, can only solve by the operating position of change hard disk partition or magnetic region.
Yet, hard disc is when operation, if there is the storage block of damage to exist, then the storage block of the storage block periphery of Sun Huaiing produces the probability system that damages and stores block greater than other in follow-up operation, therefore, if the repair of the storage block that the user does not in time damage, or in time the data in the hard disc are not backed up, then can in follow-up operation, produce at the storage block of the storage block periphery that damages damage in, cause the generation of the data loss in the storage block of this periphery, relatively, then can cause user's puzzlement, in addition, inevitably, the user and can't be optionally with deposit data in some stores block, therefore, if before the storage block of the storage block periphery that damages damaged as yet, when having data to deposit the storage block of this periphery in, then the possibility of data loss heightened.
Like this; how to provide a kind of and can solve above-mentioned prior art problems; the follow-up loss that causes data because of damage of storage block with the storage block periphery avoiding damaging; and avoid data to deposit in damaging the data guard method in the storage block of the high periphery of probability, problem demanding prompt solution in the real field for this reason.
Summary of the invention
In view of the disappearance of above-mentioned prior art, fundamental purpose of the present invention is to provide a kind of data guard method, with the follow-up loss that causes data because of damage of storage block of the storage block periphery avoiding damaging.
Another object of the present invention is to provide a kind of data guard method, deposit in the storage block that damages the high periphery of probability to avoid data.
For reaching above-mentioned main and another purpose, data guard method of the present invention is applied to have in the data handling system of storage device, this data guard method may further comprise the steps: (1) this data handling system reads this storage device when the storage block of damage is arranged, and finds out the storage block of the storage block periphery of this damage; (2) the storage block of judging this periphery in regular turn also storage block whether for damaging, if, then finish this data guard method, if not, then proceed to step (3); (3) whether the storage block of distinguishing this periphery is unused state, if, then proceed to step (4), if not, then proceed to step (5); (4) the storage block of setting this periphery is user mode, and finishes this data guard method; (5) hunt out untapped storage block in this storage device, and duplicate data in the storage block of this periphery, and this untapped storage block of setting is user mode to this untapped storage block; And (6) should periphery in this data handling system the file block index (i-node) of storage block be revised as this untapped storage block of sensing, thereby in when operation, can be directly read data in this untapped storage block by this document block index for this data handling system.
In the data guard method preferred embodiment of the present invention, this storage device is hard disc (HDD); This data handling system is one of them of computer system and server system; This step (1) is found out the storage block of the storage block periphery of this damage by the mode of searching the hard disc track; This step (3) uses the mode of the user mode field in the table to distinguish whether the storage block of this periphery is unused state by checking the file system block; This step (4) is set this periphery by the mode of the user mode field in the enactment document system block use table storage block is user mode; This step (5) hunts out untapped storage block in this storage device by the mode of checking the user mode field in the file system block use table; This step (5) is set this untapped storage block by the mode of the user mode field in the enactment document system block use table and is user mode; The mode of the disk block address in the file block index of the storage block of this step (6) by being modified in this periphery should periphery the file block index of storage block be revised as this untapped storage block of sensing, in when operation, can be directly read data in this untapped storage block for this data handling system by the disk block address in this document block index.
Than prior art; data guard method of the present invention mainly reads this storage device when the storage block of damage is arranged in this data handling system; find out the storage block of the storage block periphery of this damage earlier; then; whether the storage block of judging this periphery in regular turn also is the storage block that damages; if not be the storage block that damages; whether the storage block of then distinguishing this periphery further is unused state; if picking out the storage block of this periphery is unused state; the storage block of then setting this periphery is user mode; if the storage block that picks out this periphery is user mode; then hunt out untapped storage block in this storage device; and the interior data of the storage block that duplicates this periphery arrive this untapped storage block; and set this untapped storage block and be user mode; the file block index (i-node) of last storage block that again should periphery in this data handling system is revised as this untapped storage block of sensing; thereby supply this data handling system when operation; can be directly read data in this untapped storage block by this document block index; thus; not only can in follow-up operation, produce when damaging at the storage block of the storage block periphery that damages; protection has been stored in the interior data of storage block of this periphery; also can avoid simultaneously follow-up data to deposit in the storage block that damages the high periphery of probability, thereby reach all above-mentioned purposes.
Description of drawings
Fig. 1 is the embodiment steps flow chart synoptic diagram of data guard method of the present invention.
The main element symbol description
S10 to S15 step
Embodiment
Below by specific instantiation explanation embodiments of the present invention, those skilled in the art can understand other advantages of the present invention and effect easily by this instructions institute disclosure.The present invention also can be implemented or be used by other different instantiations, and the every details in this instructions also can be based on different viewpoints and application, carries out various modifications and change under the spirit of the present invention not deviating from.
See also Fig. 1, it is for the embodiment steps flow chart synoptic diagram of data guard method of the present invention.This data guard method is applied to have in the data handling system of storage device, and in the present embodiment, this storage device is hard disc (HDD), and this data handling system is the data handling system that computer system or server system etc. have storage device.As shown in Figure 1, this data guard method execution in step S10 to S13.
Below promptly be elaborated at each step of data guard method of the present invention respectively:
In step S10, this data handling system reads this storage device when the storage block of damage is arranged, and finds out the storage block of the storage block periphery of this damage.In the present embodiment, this step S10 finds out the storage block of the storage block periphery of this damage by the mode of searching the hard disc track, and the quantity of storage block that should periphery be 8 (with the notion of planimetric map, the storage block of this periphery lays respectively on the storage block of this damage, down, a left side, right, upper left, upper right, lower-left and lower right), but be not as limit, during actual enforcement, also can carry out the increase and decrease of quantity on demand, (with the notion of planimetric map, the storage block of this periphery lays respectively on the storage block of this damage for example to be 4, down, a left side, right-hand).
In step S11, judge in regular turn whether the storage block of this periphery also is the storage block that damages.In the present embodiment; whether the storage block of judging these 8 peripheries one by one also is the storage block that damages; if; that is the storage block of these 8 peripheries is all the storage block of damage, then finishes data guard method of the present invention; if not; that is, have a certain in the storage block of these 8 peripheries or some stores block for damage, then proceed to step S12.
In step S12, distinguish whether the storage block of this periphery is unused state.In the present embodiment, this step S12 uses the mode of the user mode field in the table to distinguish whether the storage block of this periphery is unused state by checking the file system block, that is, carry out distinguishing of user mode at storage block by the mode of checking the user mode field in the file system block use table by each unspoiled periphery of being judged among the step S11, if the result that distinguishes of the storage block of this unspoiled periphery is a unused state, then proceed to step S13, otherwise, if the result that distinguishes of the storage block of this unspoiled periphery is user mode, then proceed to step S14.
In step S13, the storage block of setting this periphery is user mode.In the present embodiment, this step S13 sets this periphery by the mode of the user mode field in the enactment document system block use table storage block is user mode, that is, in file system block use table, the user mode field of the storage block of distinguishing the unspoiled periphery that is unused state among the result among the step S12 is changed into user mode, its purpose can't be stored in follow-up new data in the storage block of this unspoiled periphery that is unused state for making this data handling system when the follow-up operation.
In step S14, hunt out untapped storage block in this storage device, and duplicate data in the storage block of this periphery, and this untapped storage block of setting is user mode to this untapped storage block.In the present embodiment, this step S14 hunts out untapped storage block in this storage device by the mode of checking the user mode field in the file system block use table, and set this untapped storage block by the mode of the user mode field in the enactment document system block use table and be user mode, that is, the data that distinguishing among the step S12 are among the result in the storage block of the unspoiled periphery of user mode backup in other untapped storage blocks, and the user mode that will back up other untapped storage blocks of data is changed into user mode, its purpose is for backing up the data in the storage block that has deposited unspoiled periphery in, and can be during at follow-up operation in this data handling system, unlikely follow-up new data is stored in these other untapped storage blocks that backed up data, and this moment, distinguishing among the step S12 is among the result user mode of the storage block of the unspoiled periphery of user mode is not changed (still for user mode), correspondingly, this data handling system also can't be stored in follow-up new data in this storage block that is the unspoiled periphery of user mode when follow-up operation.Then proceed to step S15.
In step S15, the file block index (i-node) of storage block that should periphery in this data handling system is revised as this untapped storage block of sensing, thereby in when operation, can be directly read data in this untapped storage block by this document block index for this data handling system.In general, the information that is write down in the file block index comprises: file size, user ID (User ID), the ID of group (Group ID), the file access pattern, link counting, last modification time of file and disk block address, and in the present embodiment, this step S15 by modification should periphery the file block index of storage block in the mode of disk block address should periphery the file block index of storage block be revised as this untapped storage block of sensing, that is, only point to the file block index that the Data Source person (being the storage block of the unspoiled periphery of user mode) who carries out data backup is arranged among the step S14 at having, its disk block address contents is revised as sensing data backup purpose person (the storage block of the unspoiled periphery that is hunted out), in when operation, can be directly read data in this untapped storage block for this data handling system by the disk block address in this document block index.
In sum; data guard method of the present invention mainly reads this storage device when the storage block of damage is arranged in this data handling system; find out the storage block of the storage block periphery of this damage earlier; then; whether the storage block of judging this periphery in regular turn also is the storage block that damages; if not be the storage block that damages; whether the storage block of then distinguishing this periphery further is unused state; if picking out the storage block of this periphery is unused state; the storage block of then setting this periphery is user mode; if the storage block that picks out this periphery is user mode; then hunt out untapped storage block in this storage device; and duplicate data in the storage block of this periphery to this untapped storage block; and set this untapped storage block and be user mode; the file block index of last storage block that again should periphery in this data handling system is revised as this untapped storage block of sensing; thereby supply this data handling system when operation; can be directly read data in this untapped storage block by this document block index; thus; not only can in follow-up operation, produce when damaging at the storage block of the storage block periphery that damages; protection has been stored in the interior data of storage block of this periphery, also can avoid follow-up data to deposit in the storage block that damages the high periphery of probability simultaneously.
The foregoing description is illustrative principle of the present invention and effect thereof only, but not is used to limit the present invention.Any those skilled in the art all can be under spirit of the present invention and category, and the foregoing description is modified and changed.Therefore, the scope of the present invention, claim that should be as described is listed.
Claims (2)
1. a data guard method is applied to have in the data handling system of hard disc, and this data guard method may further comprise the steps:
1) this data handling system reads this hard disc when the storage block of damage is arranged, and finds out the storage block of the storage block periphery of this damage by the mode of searching the hard disc track;
2) the storage block of judging this periphery in regular turn also storage block whether for damaging, if, then finish this data guard method, if not, then proceed to step 3);
3) use the mode of the user mode field in the table to distinguish whether the storage block of this periphery is unused state by inspection file system block, if, then proceed to step 4), if not, then proceed to step 5);
4) the storage block of setting this periphery by the mode of the user mode field in the enactment document system block use table is user mode, and finishes this data guard method;
5) hunt out untapped storage block in this hard disc by the mode of checking the user mode field in the file system block use table, and duplicate data in the storage block of this periphery, and set this untapped storage block by the mode of the user mode field in the enactment document system block use table and be user mode to this untapped storage block; And
6) mode by revising the disk block address in the file block index of the storage block of described periphery in this data handling system is revised as the file block index of the storage block of described periphery and points to described untapped storage block, in when operation, can be directly read data in the described untapped storage block for described data handling system by the disk block address in the described file block index.
2. data guard method according to claim 1, wherein, described data handling system is a server system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006101670078A CN101202078B (en) | 2006-12-12 | 2006-12-12 | Data protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006101670078A CN101202078B (en) | 2006-12-12 | 2006-12-12 | Data protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101202078A CN101202078A (en) | 2008-06-18 |
CN101202078B true CN101202078B (en) | 2010-12-22 |
Family
ID=39517191
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006101670078A Expired - Fee Related CN101202078B (en) | 2006-12-12 | 2006-12-12 | Data protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101202078B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1503224A (en) * | 2002-11-22 | 2004-06-09 | 华为技术有限公司 | Read-write operation method in multi-disc failure in five-grade independent redundant disc array |
US6880053B2 (en) * | 2002-12-19 | 2005-04-12 | Veritas Operating Corporation | Instant refresh of a data volume copy |
CN1866226A (en) * | 2005-05-17 | 2006-11-22 | 英业达股份有限公司 | Data protection method |
-
2006
- 2006-12-12 CN CN2006101670078A patent/CN101202078B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1503224A (en) * | 2002-11-22 | 2004-06-09 | 华为技术有限公司 | Read-write operation method in multi-disc failure in five-grade independent redundant disc array |
US6880053B2 (en) * | 2002-12-19 | 2005-04-12 | Veritas Operating Corporation | Instant refresh of a data volume copy |
CN1866226A (en) * | 2005-05-17 | 2006-11-22 | 英业达股份有限公司 | Data protection method |
Also Published As
Publication number | Publication date |
---|---|
CN101202078A (en) | 2008-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106201338B (en) | Date storage method and device | |
CN102012852B (en) | Method for implementing incremental snapshots-on-write | |
WO2016086819A1 (en) | Method and apparatus for writing data into shingled magnetic record smr hard disk | |
CN102096561B (en) | Hierarchical data storage processing method, device and storage equipment | |
CN102722536B (en) | Method and device for realizing snapshot based on distributed file system | |
CN103034592B (en) | Data processing method and device | |
US20160034487A1 (en) | Selective fragmentation repair | |
CN110096227A (en) | Date storage method, data processing method, device, electronic equipment and computer-readable medium | |
CN105573859A (en) | Data recovery method and device of database | |
CN106919477B (en) | Virtual disk analysis method and system | |
JP6805816B2 (en) | Information processing equipment, information processing system, information processing method and program | |
CN107315616A (en) | A kind of loading method of firmware, device and electronic equipment | |
CN100437504C (en) | Hard disc data backup system and method | |
CN105787037A (en) | Repeated data deleting method and device | |
CN109496292A (en) | A kind of disk management method, disk management device and electronic equipment | |
CN103617260A (en) | Index generation method and device for repeated data deletion | |
CN105302665A (en) | Improved copy-on-write snapshot method and system | |
WO2017143843A1 (en) | Metadata recovery method and device | |
CN103559139A (en) | Data storage method and device | |
CN110187834B (en) | Data processing method and device for duplicate copies and electronic equipment | |
CN102096613A (en) | Method and device for generating snapshot | |
CN103699681B (en) | The treating method and apparatus of data rewind | |
CN103617135B (en) | The method and device of digital independent in a kind of storage device | |
CN101202078B (en) | Data protection method | |
CN106354828A (en) | Data fragmentation method and device for distributed database |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20181128 Address after: Building 1, No. 231 Jiulong Road, Caoqiao Street, Pinghu City, Jiaxing City, Zhejiang Province Patentee after: Jiaxing Jinxu Medical Technology Co., Ltd. Address before: Taipei City, Taiwan, China Patentee before: Inventec Corporation |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20101222 Termination date: 20181212 |
|
CF01 | Termination of patent right due to non-payment of annual fee |