CN111292796B - RAID damage detailed information acquisition method, system, terminal and storage medium - Google Patents

RAID damage detailed information acquisition method, system, terminal and storage medium Download PDF

Info

Publication number
CN111292796B
CN111292796B CN202010056635.9A CN202010056635A CN111292796B CN 111292796 B CN111292796 B CN 111292796B CN 202010056635 A CN202010056635 A CN 202010056635A CN 111292796 B CN111292796 B CN 111292796B
Authority
CN
China
Prior art keywords
raid
variable
structure body
address
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010056635.9A
Other languages
Chinese (zh)
Other versions
CN111292796A (en
Inventor
刘红泽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202010056635.9A priority Critical patent/CN111292796B/en
Publication of CN111292796A publication Critical patent/CN111292796A/en
Application granted granted Critical
Publication of CN111292796B publication Critical patent/CN111292796B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C29/00Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
    • G11C29/04Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
    • G11C29/08Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
    • G11C29/12Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C29/00Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
    • G11C29/04Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
    • G11C29/08Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
    • G11C29/12Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
    • G11C2029/1208Error catch memory

Abstract

The invention provides a method, a system, a terminal and a storage medium for acquiring RAID damage detailed information, wherein the method comprises the following steps: adding a structure body in the RAID code, setting a variable item of the structure body and packaging a variable value capture function corresponding to the variable item; triggering a structure body of the RAID to call a corresponding variable grabbing function to assign values to variable items according to an address error prompt of reading the RAID stripe issued by the system; and outputting all variable values of the RAID structure body as damage detailed information through a preset printing interface of the RAID. The invention can print the detailed information of the RAID damaged LBA address in the form of a table, and more RAID information can be mastered.

Description

RAID damage detailed information acquisition method, system, terminal and storage medium
Technical Field
The invention relates to the technical field of storage equipment, in particular to a method, a system, a terminal and a storage medium for acquiring RAID damage detailed information.
Background
In the existing storage server, a plurality of hard disks can be built into a RAID disk array for use, so that the data security is improved, one RAID can comprise a plurality of hard disks, the disk array technology is that a plurality of disks are virtualized into a disk array, and for storage, one hard disk is operated, so that the storage capacity is improved, and the data security is also improved. The RAID is used for storing the data in the RAID disk array by dividing the disk into stripes, converting sector addresses on the disk into LBA (logical block addressing) addresses by the RAID, and addressing by the RAID through the LBA addresses. When a certain sector of a member disk of the RAID is damaged, reading and writing of a corresponding LBA address of the RAID can be in error, based on the existing RAID mechanism, the LBA address in which reading and writing are in error can be checked only through a system log, a corresponding interface is not used for checking detailed information, and the detailed information for storing the LBA address reading and writing error in the RAID is not very intuitive.
Disclosure of Invention
In view of the above disadvantages of the prior art, the present invention provides a method, a system, a terminal and a storage medium for obtaining RAID damage detail information, so as to solve the above technical problems.
In a first aspect, the present invention provides a method for acquiring RAID damage detail information, including:
adding a structure body in the RAID code, setting a variable item of the structure body and packaging a variable value capture function corresponding to the variable item;
triggering a structure body of the RAID to call a corresponding variable grabbing function to assign values to variable items according to an address error prompt of reading the RAID stripe issued by the system;
and outputting all variable values of the RAID structure body as damage detailed information through a preset printing interface of the RAID.
Further, the variable items of the structure body include a RAID name, a RAID level, the number of RAID member disks, an LBA address, the number of read errors, a corresponding disk device name, a corresponding sector number on the disk device, a sector size, whether to redirect, the number of consecutive error sectors, and a last accessed event type.
Further, the method further comprises:
traversing all RAID structures;
screening out all damaged strip addresses stored in the structure;
removing the corrupted stripe address from the read-write target address.
Further, the method further comprises:
setting a timing thread;
and traversing the RAID regularly according to the timing thread and repairing the damaged stripe address of the RAID.
Further, the repairing the damaged stripe address of the RAID includes:
performing parity check on the stripe address of the RAID, and judging whether the stripe address passes the parity check:
if so, judging that the strip address is an undamaged address and deleting the strip address from the structure;
if not, writing 0 to the strip address, and if the writing 0 is successful, deleting the strip address from the structure body.
Further, the method further comprises:
saving the structure variable value of the RAID to a specified document before restarting the RAID;
emptying the variable value of the structure body of the RAID after the RAID is started;
and restoring the information in the document to the structure body of the RAID.
In a second aspect, the present invention provides a RAID damage detail information acquiring system, including:
the storage setting unit is configured to add a structure body in the RAID code, set a variable item of the structure body and package a variable value grabbing function corresponding to the variable item;
the assignment triggering unit is configured to trigger a structure body of the RAID to call a corresponding variable grabbing function to assign the variable items according to an address error prompt of reading the RAID stripe issued by the system;
and the information printing unit is configured to output all variable values of the RAID structure as damage detailed information through a preset printing interface of the RAID.
Further, the system further comprises:
the information storage unit is configured to store the structure variable value of the RAID to a specified document before the RAID is restarted;
the information clearing unit is configured to clear information stored by a structure body of the RAID after the RAID is started;
and the information recovery unit is configured to recover the information in the document to the structure body of the RAID.
In a third aspect, a terminal is provided, including:
a processor, a memory, wherein,
the memory is used for storing a computer program which,
the processor is configured to call and run the computer program from the memory, so that the terminal performs the method of the terminal described above.
In a fourth aspect, a computer storage medium is provided having stored therein instructions that, when executed on a computer, cause the computer to perform the method of the above aspects.
The beneficial effect of the invention is that,
according to the RAID damage detailed information obtaining method, the system, the terminal and the storage medium, the structure body array mddev _ LBA _ err is added in the RAID codes, when the system reads and writes a certain RAID meets a damaged LBA address, the corresponding RAID structure body is triggered to automatically carry out variable assignment, and then LBA address information corresponding to read and write errors of all the RAIDs is printed in a form of a table through a sysfs interface preset in the RAID codes. The invention can print the detailed information of the RAID damage LBA address in a form of a table, and more RAID information can be mastered.
In addition, the invention has reliable design principle, simple structure and very wide application prospect.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a schematic flow diagram of a method of one embodiment of the invention.
FIG. 2 is a schematic block diagram of a system of one embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
FIG. 1 is a schematic flow diagram of a method of one embodiment of the present invention. The execution subject in fig. 1 may be a RAID damage detail information acquisition system.
As shown in fig. 1, the method 100 includes:
step 110, adding a structure body in the RAID code, setting a variable item of the structure body and packaging a variable value capture function corresponding to the variable item;
step 120, triggering a structure body of the RAID to call a corresponding variable grabbing function to assign values to variable items according to an address error prompt of reading the RAID stripe issued by the system;
and step 130, outputting all variable values of the RAID structure body as damage detailed information through a preset printing interface of the RAID.
In order to facilitate understanding of the present invention, the following describes the method for acquiring detailed RAID damage information according to the principle of the method for acquiring detailed RAID damage information of the present invention, in combination with the process of acquiring detailed RAID damage information in the embodiment.
Specifically, the RAID damage detail information obtaining method includes:
and S1, adding a structure body in the RAID code, setting a variable item of the structure body and packaging a variable value capture function corresponding to the variable item.
A structure body array mddev _ LBA _ err is added in a RAID code, and variable items of the structure body array mddev _ LBA _ err comprise variables such as RAID names, RAID levels, the number of RAID member disks, LBA addresses, the number of read errors, corresponding disk device names, corresponding sector numbers on the disk devices, sector sizes, redirection possibility, the continuous number of error sectors, and finally accessed event types.
And simultaneously, a function is grabbed at the variable value of each variable item of the mddev _ lba _ err _ add interface (injection interface) packaging structure body, and each variable item corresponds to one function, so that the automatic assignment of the variable value is realized. The variable values can be captured by a plurality of methods, such as: the level of MegaCli-LDInfo-Lall-aALL for raid is checked; the MegaCli-AdpAllInfo-aALL checks raid card information; viewing hard disk information by MegaCli-PDList-aALL; viewing the battery information through the MegaCli-AdpBbucmd-aAll; MegaCli-FwTermLog-Dsply-aALL views the raid card log.
And S2, triggering the structure body of the RAID to call a corresponding variable grabbing function to assign values to the variable items according to the address error prompt of the RAID stripe read issued by the system.
And after the system generates a prompt of reading a certain RAID stripe address error, triggering the structure body of the RAID to execute an assignment step, namely triggering an mddev _ lba _ err _ add interface of the structure body to execute a variable value capture function, and inputting the acquired parameter values into corresponding variable items by each function so as to finish assignment of the structure body.
And S3, outputting all variable values of the RAID structure as damage detailed information through a preset printing interface of the RAID.
The sysfs interface is named lba _ err by a sysfs interface (print interface) added to the RAID code. And calling a sysfs interface of the RAID by using the command cat/sys/block/mdX/md/read _ error to read the information recorded by the structural body in the current RAID, namely the detailed information list of the damaged LBA.
And S4, when the RAID is stopped from being used, the variable information of the structure body in the RAID is saved in the document, when the RAID is started again, the variable information of the RAID structure body is cleared in the RAID initialization, then the information saved in the document is read, the document information is synchronized to the structure body, and the previous data is guaranteed not to be lost.
S5, steps S1-S4 show that the variable items of the structure of the normal RAID are not assigned, and only the structure of the RAID with the strip address damage is assigned. That is, the structure has a function of recording the addresses of the defective stripes found in the past. Therefore, in the Raid read-write flow, address check logic is added, that is, when reading and writing addresses, the structure is traversed to read all damaged LBA addresses, and when reading and writing, all damaged addresses are skipped.
And S6, adding a timing thread, and executing a damaged LBA address repair process at a fixed time, wherein the repair process is mainly that some RAID stripe addresses are recorded when errors occur during certain reading and writing, but reading and writing can be continued after the stripe addresses are changed for a while, and the stripe addresses are still recorded in the structure body as damaged stripe addresses, so that the recorded damaged stripe addresses need to be checked and repaired again. The method specifically comprises the following steps: the method comprises the steps of traversing a damaged address structure, acquiring damaged address information, performing Parity Check (Parity Check) on each address, wherein the Parity Check (Parity Check) is a method for checking the transmission correctness of codes, checking according to the number of '1' in the bits of a group of binary codes to be transmitted, using odd Check, namely odd Check, and vice versa, using even Check, wherein the Check is well defined in advance, generally specially setting a Parity Check bit which is used for enabling the number of '1' in the group of codes to be odd or even, checking whether the number of '1' is odd or not when a receiving end receives the group of codes by using the odd Check, thereby determining the correctness of the transmitted codes, regarding the address as an undamaged address if the Check is successful, deleting the address can be rewritten by 0 if the Check is unsuccessful, and if the write is successful, and if the parity check or the rewrite fails, the address is continuously stored in the structure body.
As shown in fig. 2, the system 200 includes:
a storage setting unit 210 configured to add a structure in the RAID code, set a variable item of the structure, and encapsulate a variable value capture function corresponding to the variable item;
the assignment triggering unit 220 is configured to trigger the structure body of the RAID to call a corresponding variable capture function to assign a variable item according to a read RAID stripe address error prompt issued by the system;
and an information printing unit 230 configured to output all variable values of the RAID configuration body as damage detail information through a preset printing interface of the RAID.
Optionally, as an embodiment of the present invention, the system further includes:
a variable setting unit configured to set a variable of the structure, the structure variable including: RAID name, RAID level, RAID member disk number, LBA address, read error times, corresponding disk device name, corresponding sector number on the disk device, sector size, whether to redirect, error sector continuous number and last accessed event type.
Optionally, as an embodiment of the present invention, the system further includes:
the traversing unit is used for traversing all the RAID structures;
a screening unit configured to screen out all damaged strip addresses stored in the structure;
a removal unit configured to remove the defective stripe address from a read-write target address.
Optionally, as an embodiment of the present invention, the system further includes:
a timing unit configured to set a timing thread;
and the repair unit is configured to traverse the RAID at regular time according to the timing thread and repair the damaged stripe address of the RAID.
Optionally, as an embodiment of the present invention, the repair unit includes:
a parity check module configured to perform parity check on the stripe address of the RAID, and determine whether the stripe address passes the parity check:
a first deletion module configured to determine that the stripe address is an undamaged address and delete the stripe address from a fabric if the stripe address passes parity;
and the second deleting module is configured to write 0 to the stripe address if the stripe address fails the parity check, and delete the stripe address from the structure if the write 0 is successful.
Optionally, as an embodiment of the present invention, the system further includes:
the information storage unit is configured to store the structure variable value of the RAID to a specified document before the RAID is restarted;
the information clearing unit is configured to clear information stored in a structure body of the RAID after the RAID is started;
and the information recovery unit is configured to recover the information in the document to the structure body of the RAID.
Fig. 3 is a schematic structural diagram of a terminal system 300 according to an embodiment of the present invention, where the terminal system 300 may be configured to execute the method for obtaining RAID damage detail information according to the embodiment of the present invention.
The terminal system 300 may include: a processor 310, a memory 320, and a communication unit 330. The components communicate via one or more buses, and those skilled in the art will appreciate that the architecture of the servers shown in the figures is not intended to be limiting, and may be a bus architecture, a star architecture, a combination of more or less components than those shown, or a different arrangement of components.
The memory 320 may be used for storing instructions executed by the processor 310, and the memory 320 may be implemented by any type of volatile or non-volatile storage terminal or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic disk or optical disk. The executable instructions in memory 320, when executed by processor 310, enable terminal 300 to perform some or all of the steps in the method embodiments described below.
The processor 310 is a control center of the storage terminal, connects various parts of the entire electronic terminal using various interfaces and lines, and performs various functions of the electronic terminal and/or processes data by operating or executing software programs and/or modules stored in the memory 320 and calling data stored in the memory. The processor may be composed of an Integrated Circuit (IC), for example, a single packaged IC, or a plurality of packaged ICs connected with the same or different functions. For example, the processor 310 may include only a Central Processing Unit (CPU). In the embodiment of the present invention, the CPU may be a single operation core, or may include multiple operation cores.
A communication unit 330, configured to establish a communication channel so that the storage terminal can communicate with other terminals. And receiving user data sent by other terminals or sending the user data to other terminals.
The present invention also provides a computer storage medium, wherein the computer storage medium may store a program, and the program may include some or all of the steps in the embodiments provided by the present invention when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM) or a Random Access Memory (RAM).
Therefore, the structure body array mddev _ LBA _ err is added in the RAID code, when the read-write RAID meets the damaged LBA address, the variable in the structure body is assigned, the sysfs interface is added in the RAID code, and when the sysfs interface is called, the LBA address information of all RAID read-write errors is printed in a form of a table. The invention can print the detailed information of the damaged LBA address of the RAID in the form of a table, and more RAID information can be mastered.
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be substantially or partially embodied in the form of a software product, the computer software product is stored in a storage medium, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and various media capable of storing program codes include several instructions for enabling a computer terminal (which may be a personal computer, a server, or a second terminal, a network terminal, etc.) to execute all or part of the steps of the method in the embodiments of the present invention.
The same and similar parts in the various embodiments in this specification may be referred to each other. Especially, for the terminal embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant points can be referred to the description in the method embodiment.
In the embodiments provided in the present invention, it should be understood that the disclosed system and method can be implemented in other ways. For example, the above-described system embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, systems or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
Although the present invention has been described in detail by referring to the drawings in connection with the preferred embodiments, the present invention is not limited thereto. Various equivalent modifications or substitutions can be made on the embodiments of the present invention by those skilled in the art without departing from the spirit and scope of the present invention, and these modifications or substitutions are within the scope of the present invention/any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (9)

1. A RAID damage detail information acquisition method is characterized by comprising the following steps:
adding a structure body in the RAID code, setting a variable item of the structure body and packaging a variable value capture function corresponding to the variable item;
triggering a structure body of the RAID to call a corresponding variable grabbing function to assign values to variable items according to an address error prompt of reading the RAID stripe issued by the system;
outputting all variable values of the RAID structure as damage detailed information through a preset printing interface of the RAID;
the variable items of the structure body comprise RAID names, RAID levels, the number of RAID member disks, LBA addresses, reading error times, corresponding disk equipment names, corresponding sector numbers on the disk equipment, sector sizes, redirection, error sector continuous numbers and event types of final access.
2. The method of claim 1, further comprising:
traversing all RAID structures;
screening out all damaged strip addresses stored in the structure;
removing the corrupted stripe address from the read-write target address.
3. The method of claim 1, further comprising:
setting a timing thread;
and traversing the RAID regularly according to the timing thread and repairing the damaged stripe address of the RAID.
4. The method of claim 3, wherein performing the repair of the defective stripe address to the RAID comprises:
performing parity check on the stripe address of the RAID, and judging whether the stripe address passes the parity check:
if so, judging that the strip address is an undamaged address and deleting the strip address from the structure;
if not, writing 0 to the strip address, and if the writing 0 is successful, deleting the strip address from the structure body.
5. The method of claim 1, further comprising:
saving the structure variable value of the RAID to a specified document before restarting the RAID;
emptying the variable value of the structure body of the RAID after the RAID is started;
and restoring the information in the document to the structure body of the RAID.
6. A RAID corruption detail information acquisition system comprising:
the storage setting unit is configured to add a structure body in the RAID code, set a variable item of the structure body and package a variable value grabbing function corresponding to the variable item;
the assignment triggering unit is configured to trigger a structure body of the RAID to call a corresponding variable grabbing function to assign the variable items according to an address error prompt of reading the RAID stripe issued by the system;
the information printing unit is configured to output all variable values of the RAID structure as damage detailed information through a preset printing interface of the RAID;
the variable items of the structure body comprise RAID names, RAID levels, the number of RAID member disks, LBA addresses, reading error times, corresponding disk equipment names, corresponding sector numbers on the disk equipment, sector sizes, redirection, error sector continuous numbers and event types of final access.
7. The system of claim 6, further comprising:
the information storage unit is configured to store the structure variable value of the RAID to a specified document before the RAID is restarted;
the information clearing unit is configured to clear information stored by a structure body of the RAID after the RAID is started;
and the information recovery unit is configured to recover the information in the document to the structure body of the RAID.
8. A terminal, comprising:
a processor;
a memory for storing instructions for execution by the processor;
wherein the processor is configured to perform the method of any one of claims 1-5.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-5.
CN202010056635.9A 2020-01-18 2020-01-18 RAID damage detailed information acquisition method, system, terminal and storage medium Active CN111292796B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010056635.9A CN111292796B (en) 2020-01-18 2020-01-18 RAID damage detailed information acquisition method, system, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010056635.9A CN111292796B (en) 2020-01-18 2020-01-18 RAID damage detailed information acquisition method, system, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN111292796A CN111292796A (en) 2020-06-16
CN111292796B true CN111292796B (en) 2022-08-12

Family

ID=71028387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010056635.9A Active CN111292796B (en) 2020-01-18 2020-01-18 RAID damage detailed information acquisition method, system, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN111292796B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107731262A (en) * 2017-09-29 2018-02-23 郑州云海信息技术有限公司 A kind of storage disk bad block management method, device, equipment and readable storage medium storing program for executing
CN109240847A (en) * 2018-09-27 2019-01-18 郑州云海信息技术有限公司 EMS memory error report method, device, terminal and storage medium during a kind of POST
CN110688268A (en) * 2019-09-09 2020-01-14 苏州浪潮智能科技有限公司 Fault positioning method, device, equipment and medium for NVME SSD

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107731262A (en) * 2017-09-29 2018-02-23 郑州云海信息技术有限公司 A kind of storage disk bad block management method, device, equipment and readable storage medium storing program for executing
CN109240847A (en) * 2018-09-27 2019-01-18 郑州云海信息技术有限公司 EMS memory error report method, device, terminal and storage medium during a kind of POST
CN110688268A (en) * 2019-09-09 2020-01-14 苏州浪潮智能科技有限公司 Fault positioning method, device, equipment and medium for NVME SSD

Also Published As

Publication number Publication date
CN111292796A (en) 2020-06-16

Similar Documents

Publication Publication Date Title
CN108646982B (en) Automatic data restoration method and device based on UBIFS
KR0121800B1 (en) Memory card device
CN110399247B (en) Data recovery method, device and equipment and computer readable storage medium
US11874741B2 (en) Data recovery method in storage medium, data recovery system, and related device
CN111722793A (en) Operation method of open channel storage device
CN108701005A (en) Data update technology
CN115793985B (en) Secure storage method, apparatus, device and storage medium
CN110941394A (en) Data reading and writing method and device for automatic train control system
US6363457B1 (en) Method and system for non-disruptive addition and deletion of logical devices
CN111045858B (en) Bad track processing method and system
KR101548452B1 (en) Method and apparatus for recovering metadata in electronic device based on non-volatile memeory
CN111292796B (en) RAID damage detailed information acquisition method, system, terminal and storage medium
CN115878052B (en) RAID array inspection method, inspection device and electronic equipment
CN117131014A (en) Database migration method, device, equipment and storage medium
JP3675375B2 (en) Nonvolatile memory and data rewriting method of nonvolatile memory
CN116501259A (en) Disk group dual-activity synchronization method and device, computer equipment and storage medium
CN115309435A (en) Equipment firmware upgrading method and device and electronic equipment
US9880926B1 (en) Log structured reserved zone for a data storage device
CN114203252A (en) Bad block detection method, device, equipment and storage medium of nonvolatile memory
CN111104256A (en) Data reading method, device, equipment and storage medium
CN111897676A (en) File backup method and device based on database index
CN117111860B (en) IO processing method and device during disk array degradation and electronic equipment
JPH10161942A (en) Method, device for storing information, and information processor
KR101545077B1 (en) Method and apparatus for recovering metadata in electronic device based on non-volatile memeory
CN114201320B (en) System block upgrading method and device, readable storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant