CN111292796B - RAID damage detailed information acquisition method, system, terminal and storage medium - Google Patents
RAID damage detailed information acquisition method, system, terminal and storage medium Download PDFInfo
- Publication number
- CN111292796B CN111292796B CN202010056635.9A CN202010056635A CN111292796B CN 111292796 B CN111292796 B CN 111292796B CN 202010056635 A CN202010056635 A CN 202010056635A CN 111292796 B CN111292796 B CN 111292796B
- Authority
- CN
- China
- Prior art keywords
- raid
- variable
- structure body
- address
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000007639 printing Methods 0.000 claims abstract description 11
- 238000004806 packaging method and process Methods 0.000 claims abstract description 6
- 230000006870 function Effects 0.000 claims description 21
- 230000008439 repair process Effects 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 3
- 230000002950 deficient Effects 0.000 claims description 3
- 238000011084 recovery Methods 0.000 claims description 3
- 238000012216 screening Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 239000000243 solution Substances 0.000 description 5
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000006467 substitution reaction Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 241000282326 Felis catus Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C2029/1208—Error catch memory
Abstract
The invention provides a method, a system, a terminal and a storage medium for acquiring RAID damage detailed information, wherein the method comprises the following steps: adding a structure body in the RAID code, setting a variable item of the structure body and packaging a variable value capture function corresponding to the variable item; triggering a structure body of the RAID to call a corresponding variable grabbing function to assign values to variable items according to an address error prompt of reading the RAID stripe issued by the system; and outputting all variable values of the RAID structure body as damage detailed information through a preset printing interface of the RAID. The invention can print the detailed information of the RAID damaged LBA address in the form of a table, and more RAID information can be mastered.
Description
Technical Field
The invention relates to the technical field of storage equipment, in particular to a method, a system, a terminal and a storage medium for acquiring RAID damage detailed information.
Background
In the existing storage server, a plurality of hard disks can be built into a RAID disk array for use, so that the data security is improved, one RAID can comprise a plurality of hard disks, the disk array technology is that a plurality of disks are virtualized into a disk array, and for storage, one hard disk is operated, so that the storage capacity is improved, and the data security is also improved. The RAID is used for storing the data in the RAID disk array by dividing the disk into stripes, converting sector addresses on the disk into LBA (logical block addressing) addresses by the RAID, and addressing by the RAID through the LBA addresses. When a certain sector of a member disk of the RAID is damaged, reading and writing of a corresponding LBA address of the RAID can be in error, based on the existing RAID mechanism, the LBA address in which reading and writing are in error can be checked only through a system log, a corresponding interface is not used for checking detailed information, and the detailed information for storing the LBA address reading and writing error in the RAID is not very intuitive.
Disclosure of Invention
In view of the above disadvantages of the prior art, the present invention provides a method, a system, a terminal and a storage medium for obtaining RAID damage detail information, so as to solve the above technical problems.
In a first aspect, the present invention provides a method for acquiring RAID damage detail information, including:
adding a structure body in the RAID code, setting a variable item of the structure body and packaging a variable value capture function corresponding to the variable item;
triggering a structure body of the RAID to call a corresponding variable grabbing function to assign values to variable items according to an address error prompt of reading the RAID stripe issued by the system;
and outputting all variable values of the RAID structure body as damage detailed information through a preset printing interface of the RAID.
Further, the variable items of the structure body include a RAID name, a RAID level, the number of RAID member disks, an LBA address, the number of read errors, a corresponding disk device name, a corresponding sector number on the disk device, a sector size, whether to redirect, the number of consecutive error sectors, and a last accessed event type.
Further, the method further comprises:
traversing all RAID structures;
screening out all damaged strip addresses stored in the structure;
removing the corrupted stripe address from the read-write target address.
Further, the method further comprises:
setting a timing thread;
and traversing the RAID regularly according to the timing thread and repairing the damaged stripe address of the RAID.
Further, the repairing the damaged stripe address of the RAID includes:
performing parity check on the stripe address of the RAID, and judging whether the stripe address passes the parity check:
if so, judging that the strip address is an undamaged address and deleting the strip address from the structure;
if not, writing 0 to the strip address, and if the writing 0 is successful, deleting the strip address from the structure body.
Further, the method further comprises:
saving the structure variable value of the RAID to a specified document before restarting the RAID;
emptying the variable value of the structure body of the RAID after the RAID is started;
and restoring the information in the document to the structure body of the RAID.
In a second aspect, the present invention provides a RAID damage detail information acquiring system, including:
the storage setting unit is configured to add a structure body in the RAID code, set a variable item of the structure body and package a variable value grabbing function corresponding to the variable item;
the assignment triggering unit is configured to trigger a structure body of the RAID to call a corresponding variable grabbing function to assign the variable items according to an address error prompt of reading the RAID stripe issued by the system;
and the information printing unit is configured to output all variable values of the RAID structure as damage detailed information through a preset printing interface of the RAID.
Further, the system further comprises:
the information storage unit is configured to store the structure variable value of the RAID to a specified document before the RAID is restarted;
the information clearing unit is configured to clear information stored by a structure body of the RAID after the RAID is started;
and the information recovery unit is configured to recover the information in the document to the structure body of the RAID.
In a third aspect, a terminal is provided, including:
a processor, a memory, wherein,
the memory is used for storing a computer program which,
the processor is configured to call and run the computer program from the memory, so that the terminal performs the method of the terminal described above.
In a fourth aspect, a computer storage medium is provided having stored therein instructions that, when executed on a computer, cause the computer to perform the method of the above aspects.
The beneficial effect of the invention is that,
according to the RAID damage detailed information obtaining method, the system, the terminal and the storage medium, the structure body array mddev _ LBA _ err is added in the RAID codes, when the system reads and writes a certain RAID meets a damaged LBA address, the corresponding RAID structure body is triggered to automatically carry out variable assignment, and then LBA address information corresponding to read and write errors of all the RAIDs is printed in a form of a table through a sysfs interface preset in the RAID codes. The invention can print the detailed information of the RAID damage LBA address in a form of a table, and more RAID information can be mastered.
In addition, the invention has reliable design principle, simple structure and very wide application prospect.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a schematic flow diagram of a method of one embodiment of the invention.
FIG. 2 is a schematic block diagram of a system of one embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
FIG. 1 is a schematic flow diagram of a method of one embodiment of the present invention. The execution subject in fig. 1 may be a RAID damage detail information acquisition system.
As shown in fig. 1, the method 100 includes:
and step 130, outputting all variable values of the RAID structure body as damage detailed information through a preset printing interface of the RAID.
In order to facilitate understanding of the present invention, the following describes the method for acquiring detailed RAID damage information according to the principle of the method for acquiring detailed RAID damage information of the present invention, in combination with the process of acquiring detailed RAID damage information in the embodiment.
Specifically, the RAID damage detail information obtaining method includes:
and S1, adding a structure body in the RAID code, setting a variable item of the structure body and packaging a variable value capture function corresponding to the variable item.
A structure body array mddev _ LBA _ err is added in a RAID code, and variable items of the structure body array mddev _ LBA _ err comprise variables such as RAID names, RAID levels, the number of RAID member disks, LBA addresses, the number of read errors, corresponding disk device names, corresponding sector numbers on the disk devices, sector sizes, redirection possibility, the continuous number of error sectors, and finally accessed event types.
And simultaneously, a function is grabbed at the variable value of each variable item of the mddev _ lba _ err _ add interface (injection interface) packaging structure body, and each variable item corresponds to one function, so that the automatic assignment of the variable value is realized. The variable values can be captured by a plurality of methods, such as: the level of MegaCli-LDInfo-Lall-aALL for raid is checked; the MegaCli-AdpAllInfo-aALL checks raid card information; viewing hard disk information by MegaCli-PDList-aALL; viewing the battery information through the MegaCli-AdpBbucmd-aAll; MegaCli-FwTermLog-Dsply-aALL views the raid card log.
And S2, triggering the structure body of the RAID to call a corresponding variable grabbing function to assign values to the variable items according to the address error prompt of the RAID stripe read issued by the system.
And after the system generates a prompt of reading a certain RAID stripe address error, triggering the structure body of the RAID to execute an assignment step, namely triggering an mddev _ lba _ err _ add interface of the structure body to execute a variable value capture function, and inputting the acquired parameter values into corresponding variable items by each function so as to finish assignment of the structure body.
And S3, outputting all variable values of the RAID structure as damage detailed information through a preset printing interface of the RAID.
The sysfs interface is named lba _ err by a sysfs interface (print interface) added to the RAID code. And calling a sysfs interface of the RAID by using the command cat/sys/block/mdX/md/read _ error to read the information recorded by the structural body in the current RAID, namely the detailed information list of the damaged LBA.
And S4, when the RAID is stopped from being used, the variable information of the structure body in the RAID is saved in the document, when the RAID is started again, the variable information of the RAID structure body is cleared in the RAID initialization, then the information saved in the document is read, the document information is synchronized to the structure body, and the previous data is guaranteed not to be lost.
S5, steps S1-S4 show that the variable items of the structure of the normal RAID are not assigned, and only the structure of the RAID with the strip address damage is assigned. That is, the structure has a function of recording the addresses of the defective stripes found in the past. Therefore, in the Raid read-write flow, address check logic is added, that is, when reading and writing addresses, the structure is traversed to read all damaged LBA addresses, and when reading and writing, all damaged addresses are skipped.
And S6, adding a timing thread, and executing a damaged LBA address repair process at a fixed time, wherein the repair process is mainly that some RAID stripe addresses are recorded when errors occur during certain reading and writing, but reading and writing can be continued after the stripe addresses are changed for a while, and the stripe addresses are still recorded in the structure body as damaged stripe addresses, so that the recorded damaged stripe addresses need to be checked and repaired again. The method specifically comprises the following steps: the method comprises the steps of traversing a damaged address structure, acquiring damaged address information, performing Parity Check (Parity Check) on each address, wherein the Parity Check (Parity Check) is a method for checking the transmission correctness of codes, checking according to the number of '1' in the bits of a group of binary codes to be transmitted, using odd Check, namely odd Check, and vice versa, using even Check, wherein the Check is well defined in advance, generally specially setting a Parity Check bit which is used for enabling the number of '1' in the group of codes to be odd or even, checking whether the number of '1' is odd or not when a receiving end receives the group of codes by using the odd Check, thereby determining the correctness of the transmitted codes, regarding the address as an undamaged address if the Check is successful, deleting the address can be rewritten by 0 if the Check is unsuccessful, and if the write is successful, and if the parity check or the rewrite fails, the address is continuously stored in the structure body.
As shown in fig. 2, the system 200 includes:
a storage setting unit 210 configured to add a structure in the RAID code, set a variable item of the structure, and encapsulate a variable value capture function corresponding to the variable item;
the assignment triggering unit 220 is configured to trigger the structure body of the RAID to call a corresponding variable capture function to assign a variable item according to a read RAID stripe address error prompt issued by the system;
and an information printing unit 230 configured to output all variable values of the RAID configuration body as damage detail information through a preset printing interface of the RAID.
Optionally, as an embodiment of the present invention, the system further includes:
a variable setting unit configured to set a variable of the structure, the structure variable including: RAID name, RAID level, RAID member disk number, LBA address, read error times, corresponding disk device name, corresponding sector number on the disk device, sector size, whether to redirect, error sector continuous number and last accessed event type.
Optionally, as an embodiment of the present invention, the system further includes:
the traversing unit is used for traversing all the RAID structures;
a screening unit configured to screen out all damaged strip addresses stored in the structure;
a removal unit configured to remove the defective stripe address from a read-write target address.
Optionally, as an embodiment of the present invention, the system further includes:
a timing unit configured to set a timing thread;
and the repair unit is configured to traverse the RAID at regular time according to the timing thread and repair the damaged stripe address of the RAID.
Optionally, as an embodiment of the present invention, the repair unit includes:
a parity check module configured to perform parity check on the stripe address of the RAID, and determine whether the stripe address passes the parity check:
a first deletion module configured to determine that the stripe address is an undamaged address and delete the stripe address from a fabric if the stripe address passes parity;
and the second deleting module is configured to write 0 to the stripe address if the stripe address fails the parity check, and delete the stripe address from the structure if the write 0 is successful.
Optionally, as an embodiment of the present invention, the system further includes:
the information storage unit is configured to store the structure variable value of the RAID to a specified document before the RAID is restarted;
the information clearing unit is configured to clear information stored in a structure body of the RAID after the RAID is started;
and the information recovery unit is configured to recover the information in the document to the structure body of the RAID.
Fig. 3 is a schematic structural diagram of a terminal system 300 according to an embodiment of the present invention, where the terminal system 300 may be configured to execute the method for obtaining RAID damage detail information according to the embodiment of the present invention.
The terminal system 300 may include: a processor 310, a memory 320, and a communication unit 330. The components communicate via one or more buses, and those skilled in the art will appreciate that the architecture of the servers shown in the figures is not intended to be limiting, and may be a bus architecture, a star architecture, a combination of more or less components than those shown, or a different arrangement of components.
The memory 320 may be used for storing instructions executed by the processor 310, and the memory 320 may be implemented by any type of volatile or non-volatile storage terminal or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic disk or optical disk. The executable instructions in memory 320, when executed by processor 310, enable terminal 300 to perform some or all of the steps in the method embodiments described below.
The processor 310 is a control center of the storage terminal, connects various parts of the entire electronic terminal using various interfaces and lines, and performs various functions of the electronic terminal and/or processes data by operating or executing software programs and/or modules stored in the memory 320 and calling data stored in the memory. The processor may be composed of an Integrated Circuit (IC), for example, a single packaged IC, or a plurality of packaged ICs connected with the same or different functions. For example, the processor 310 may include only a Central Processing Unit (CPU). In the embodiment of the present invention, the CPU may be a single operation core, or may include multiple operation cores.
A communication unit 330, configured to establish a communication channel so that the storage terminal can communicate with other terminals. And receiving user data sent by other terminals or sending the user data to other terminals.
The present invention also provides a computer storage medium, wherein the computer storage medium may store a program, and the program may include some or all of the steps in the embodiments provided by the present invention when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM) or a Random Access Memory (RAM).
Therefore, the structure body array mddev _ LBA _ err is added in the RAID code, when the read-write RAID meets the damaged LBA address, the variable in the structure body is assigned, the sysfs interface is added in the RAID code, and when the sysfs interface is called, the LBA address information of all RAID read-write errors is printed in a form of a table. The invention can print the detailed information of the damaged LBA address of the RAID in the form of a table, and more RAID information can be mastered.
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be substantially or partially embodied in the form of a software product, the computer software product is stored in a storage medium, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and various media capable of storing program codes include several instructions for enabling a computer terminal (which may be a personal computer, a server, or a second terminal, a network terminal, etc.) to execute all or part of the steps of the method in the embodiments of the present invention.
The same and similar parts in the various embodiments in this specification may be referred to each other. Especially, for the terminal embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant points can be referred to the description in the method embodiment.
In the embodiments provided in the present invention, it should be understood that the disclosed system and method can be implemented in other ways. For example, the above-described system embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, systems or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
Although the present invention has been described in detail by referring to the drawings in connection with the preferred embodiments, the present invention is not limited thereto. Various equivalent modifications or substitutions can be made on the embodiments of the present invention by those skilled in the art without departing from the spirit and scope of the present invention, and these modifications or substitutions are within the scope of the present invention/any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (9)
1. A RAID damage detail information acquisition method is characterized by comprising the following steps:
adding a structure body in the RAID code, setting a variable item of the structure body and packaging a variable value capture function corresponding to the variable item;
triggering a structure body of the RAID to call a corresponding variable grabbing function to assign values to variable items according to an address error prompt of reading the RAID stripe issued by the system;
outputting all variable values of the RAID structure as damage detailed information through a preset printing interface of the RAID;
the variable items of the structure body comprise RAID names, RAID levels, the number of RAID member disks, LBA addresses, reading error times, corresponding disk equipment names, corresponding sector numbers on the disk equipment, sector sizes, redirection, error sector continuous numbers and event types of final access.
2. The method of claim 1, further comprising:
traversing all RAID structures;
screening out all damaged strip addresses stored in the structure;
removing the corrupted stripe address from the read-write target address.
3. The method of claim 1, further comprising:
setting a timing thread;
and traversing the RAID regularly according to the timing thread and repairing the damaged stripe address of the RAID.
4. The method of claim 3, wherein performing the repair of the defective stripe address to the RAID comprises:
performing parity check on the stripe address of the RAID, and judging whether the stripe address passes the parity check:
if so, judging that the strip address is an undamaged address and deleting the strip address from the structure;
if not, writing 0 to the strip address, and if the writing 0 is successful, deleting the strip address from the structure body.
5. The method of claim 1, further comprising:
saving the structure variable value of the RAID to a specified document before restarting the RAID;
emptying the variable value of the structure body of the RAID after the RAID is started;
and restoring the information in the document to the structure body of the RAID.
6. A RAID corruption detail information acquisition system comprising:
the storage setting unit is configured to add a structure body in the RAID code, set a variable item of the structure body and package a variable value grabbing function corresponding to the variable item;
the assignment triggering unit is configured to trigger a structure body of the RAID to call a corresponding variable grabbing function to assign the variable items according to an address error prompt of reading the RAID stripe issued by the system;
the information printing unit is configured to output all variable values of the RAID structure as damage detailed information through a preset printing interface of the RAID;
the variable items of the structure body comprise RAID names, RAID levels, the number of RAID member disks, LBA addresses, reading error times, corresponding disk equipment names, corresponding sector numbers on the disk equipment, sector sizes, redirection, error sector continuous numbers and event types of final access.
7. The system of claim 6, further comprising:
the information storage unit is configured to store the structure variable value of the RAID to a specified document before the RAID is restarted;
the information clearing unit is configured to clear information stored by a structure body of the RAID after the RAID is started;
and the information recovery unit is configured to recover the information in the document to the structure body of the RAID.
8. A terminal, comprising:
a processor;
a memory for storing instructions for execution by the processor;
wherein the processor is configured to perform the method of any one of claims 1-5.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010056635.9A CN111292796B (en) | 2020-01-18 | 2020-01-18 | RAID damage detailed information acquisition method, system, terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010056635.9A CN111292796B (en) | 2020-01-18 | 2020-01-18 | RAID damage detailed information acquisition method, system, terminal and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111292796A CN111292796A (en) | 2020-06-16 |
CN111292796B true CN111292796B (en) | 2022-08-12 |
Family
ID=71028387
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010056635.9A Active CN111292796B (en) | 2020-01-18 | 2020-01-18 | RAID damage detailed information acquisition method, system, terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111292796B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107731262A (en) * | 2017-09-29 | 2018-02-23 | 郑州云海信息技术有限公司 | A kind of storage disk bad block management method, device, equipment and readable storage medium storing program for executing |
CN109240847A (en) * | 2018-09-27 | 2019-01-18 | 郑州云海信息技术有限公司 | EMS memory error report method, device, terminal and storage medium during a kind of POST |
CN110688268A (en) * | 2019-09-09 | 2020-01-14 | 苏州浪潮智能科技有限公司 | Fault positioning method, device, equipment and medium for NVME SSD |
-
2020
- 2020-01-18 CN CN202010056635.9A patent/CN111292796B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107731262A (en) * | 2017-09-29 | 2018-02-23 | 郑州云海信息技术有限公司 | A kind of storage disk bad block management method, device, equipment and readable storage medium storing program for executing |
CN109240847A (en) * | 2018-09-27 | 2019-01-18 | 郑州云海信息技术有限公司 | EMS memory error report method, device, terminal and storage medium during a kind of POST |
CN110688268A (en) * | 2019-09-09 | 2020-01-14 | 苏州浪潮智能科技有限公司 | Fault positioning method, device, equipment and medium for NVME SSD |
Also Published As
Publication number | Publication date |
---|---|
CN111292796A (en) | 2020-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108646982B (en) | Automatic data restoration method and device based on UBIFS | |
KR0121800B1 (en) | Memory card device | |
CN110399247B (en) | Data recovery method, device and equipment and computer readable storage medium | |
US11874741B2 (en) | Data recovery method in storage medium, data recovery system, and related device | |
CN111722793A (en) | Operation method of open channel storage device | |
CN108701005A (en) | Data update technology | |
CN115793985B (en) | Secure storage method, apparatus, device and storage medium | |
CN110941394A (en) | Data reading and writing method and device for automatic train control system | |
US6363457B1 (en) | Method and system for non-disruptive addition and deletion of logical devices | |
CN111045858B (en) | Bad track processing method and system | |
KR101548452B1 (en) | Method and apparatus for recovering metadata in electronic device based on non-volatile memeory | |
CN111292796B (en) | RAID damage detailed information acquisition method, system, terminal and storage medium | |
CN115878052B (en) | RAID array inspection method, inspection device and electronic equipment | |
CN117131014A (en) | Database migration method, device, equipment and storage medium | |
JP3675375B2 (en) | Nonvolatile memory and data rewriting method of nonvolatile memory | |
CN116501259A (en) | Disk group dual-activity synchronization method and device, computer equipment and storage medium | |
CN115309435A (en) | Equipment firmware upgrading method and device and electronic equipment | |
US9880926B1 (en) | Log structured reserved zone for a data storage device | |
CN114203252A (en) | Bad block detection method, device, equipment and storage medium of nonvolatile memory | |
CN111104256A (en) | Data reading method, device, equipment and storage medium | |
CN111897676A (en) | File backup method and device based on database index | |
CN117111860B (en) | IO processing method and device during disk array degradation and electronic equipment | |
JPH10161942A (en) | Method, device for storing information, and information processor | |
KR101545077B1 (en) | Method and apparatus for recovering metadata in electronic device based on non-volatile memeory | |
CN114201320B (en) | System block upgrading method and device, readable storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |