CN110389853A - A kind of protection and restoration methods of embedded file system - Google Patents

A kind of protection and restoration methods of embedded file system Download PDF

Info

Publication number
CN110389853A
CN110389853A CN201910559628.8A CN201910559628A CN110389853A CN 110389853 A CN110389853 A CN 110389853A CN 201910559628 A CN201910559628 A CN 201910559628A CN 110389853 A CN110389853 A CN 110389853A
Authority
CN
China
Prior art keywords
area
file
data
steps
protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910559628.8A
Other languages
Chinese (zh)
Other versions
CN110389853B (en
Inventor
陈超鑫
汤可
范律
肖林松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wasion Information Technology Ltd By Share Ltd
Original Assignee
Wasion Information Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wasion Information Technology Ltd By Share Ltd filed Critical Wasion Information Technology Ltd By Share Ltd
Priority to CN201910559628.8A priority Critical patent/CN110389853B/en
Publication of CN110389853A publication Critical patent/CN110389853A/en
Application granted granted Critical
Publication of CN110389853B publication Critical patent/CN110389853B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1004Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A kind of protection and restoration methods of embedded file system, comprising the following steps: after embedded system electrification reset, carry out system correlation and peripheral hardware initialization;B detects the operation of the area carry Mount, and whether carry is successful;Whether data, which effectively detect, is carried out to the area DBR, FAT area, the area DIR;System executes formatting to the area Mount;To the area DBR, the FAT area, the area DIR again partition format, after partition format success, system, which executes, restores parameter manipulation;System operates normally.The protection and restoration methods of embedded file system provided by the invention; upon power-up of the system; since the area Mount carry; safeguard measure is entered, in order to ensure the accuracy of system operation, the data accuracy in the area DBR, FAT area, the area DIR is detected; and take corresponding recovery operation; it is that those skilled in the art is not thinkable from the normal operation of the angle safeguards system of system data accuracy, there is tremendous improvement in the protection of embedded system.

Description

A kind of protection and restoration methods of embedded file system
Technical field
The present invention relates to the protections and restoration methods of embedded system field more particularly to a kind of embedded file system.
Background technique
So far, with the development of CortexM0, M0+, M3, M4, M7ARM nuclear technology, use Cortex M core as The chip of CPU core design is more and more, and Cortex M core family chip is also more and more in each producer's use.Due to Cortex M The limitation of core family chip area, chip interior institute band RAM, ROM is simultaneously little, is typically designed between tens K to 1M.But on it The application task of operation becomes increasingly complex, and function is stronger and stronger, it is desirable that the data of processing also dramatically increase, to various data More stringent requirements are proposed for management.In order to reinforce the management to system related data, it has to seek the support of file system.Text Unique parts of the part system as embedded system data management, importance are self-evident.
The file system that can be run on small memory on the market at present mainly has FatFs, uCFs, TinyFs, LittleFs, Other mass file system can hardly be transplanted on small memory MCU.But there is no completely at the beginning of above-mentioned each File system design Consider memory headroom size, operational efficiency is not high, and many functions are also not perfect.Really above-mentioned file system is transplanted to It can be found after Cortex M family chip, in use there are a series of problem, main performance is as follows:
Embedded file system does not support power down protection.Since Flash internal element design attributes itself determine, for It can only be become 0 (electric discharge) by 1 by single memory cell, cannot become 1 (charging) from 0.Becoming 1 by 0 can only be provided by Flash Erasing order and operated by block.So generally first the content in one piece is all copied out when being write to Flash Then block erasing is carried out, the content that will finally modify is written together by page.One piece is typically designed as 4K, 8K, 16K or bigger, Since there may be random power down during erasing, will exist and fully or only erase a part without erasing, also have It may not have enough time being written or being only written a part of data after erasing, can all generate mass data loss in this way.That loses is important Data can run system and have an impact, if what is lost is FAT table or DIR table, can all lose cannot for considerable file at this time Again normal to read, serious error will be generated, is catastrophic for system.
Embedded file system does not support subregion to detect automatically, can not judge whether FAT table or the area DIR damage or part is damaged It is bad.It is caused the result is that damage file system still in error running, cannot find in time and take measures to be restored to Normal operating condition.The consequence continued to run is exactly that system unpredictable mistake occurs.
Application No. is 201711497600.3 application documents to disclose a kind of realization of lightweight embedded file system Method, only a kind of process whether identification data are legal, does not disclose how to protect and restore embedded file system The method of valid data.
Therefore, the protection of existing embedded system and data reconstruction method could be improved and improve.
Summary of the invention
Place in view of above-mentioned deficiencies of the prior art, the purpose of the present invention is to provide a kind of guarantors of embedded file system Shield and restoration methods, can judge rapidly whether corresponding data have the case where damage at the beginning of activation system, if there is Then automatically carry out Parameter reconstruction operation, can effectively guarantee file system will not run-time error file.
In order to achieve the above object, this invention takes following technical schemes:
A kind of protection and restoration methods of embedded file system, comprising the following steps:
A, after embedded system electrification reset, system correlation and peripheral hardware initialization are carried out;
B, whether carry is successful for the operation of the detection area carry Mount, if so then execute step C;If it is not, thening follow the steps D;
C, whether data, which effectively detect, is carried out to the area DBR, FAT area, the area DIR, if so, thening follow the steps F;If it is not, then holding Row step E;
D, system executes formatting to the area Mount, after the completion of formatting successfully, executes step B;If formatting does not succeed It completes, then prompts error message;
E, to the area DBR, the FAT area, the area DIR again partition format, after partition format success, system It executes and restores parameter manipulation, and execute step C;If partition format and/or recovery parameter manipulation do not succeed, mistake is prompted Information;
F, system operates normally.
The protection and restoration methods of the embedded file system further include step C ' in the step C: if Whether the area DBR, the FAT area, the data in the area DIR are effective, then effectively detect to the data in the area DATA, if It is to then follow the steps F;If it is not, then executing recovery parameter manipulation.
The protection and restoration methods of the embedded file system, the recovery parameter manipulation specifically include with Lower step:
E1, file backup/restoration record information in apterium is read;
E2, file record head information is read;
E3, file record data are read;
Whether whether E4, the verification record data legal with backup/restoration record information, if so then execute step E5;If it is not, thening follow the steps E6;
E5, according to record filename, respective file is generated in subregion, and whether verify the respective file normal, if It is to then follow the steps E6;If it is not, thening follow the steps E4;
E6, whether All Files all restore to complete for verification, if system file Backup and Restore record is then arranged, execute step F;If it is not, thening follow the steps E3.
The protection and restoration methods of the preferred embedded file system, step E further comprise the steps of: E0, will default Parameter/real-time parameter full backup to apterium.
The protection and restoration methods of the embedded file system, the recording head information include: filename, The CRC check of file size and file;
The obtained legal state of the verification in the step E4 refers to: reading file record head information, root File record data are read according to file size, CRC check are carried out to data, and by the CRC in the CRC and File header information of calculating Comparison, the consistent state of information data.
The protection and restoration methods of the preferred embedded file system, further comprise the steps of:
G, system real-time detection whether power down, if so, system execute power down protection mode;If it is not, thening follow the steps F.
The protection and restoration methods of the preferred embedded file system, the step G include:
G1, with preset frequency detection system whether power down, if so, thening follow the steps G2;If it is not, thening follow the steps F;
The intermediate data that generates in G2, the operation of preservation system, and generate power down record, setting system is powered down mark;
G3, stop initiating new write operation, if there is write operation in commission in system, be delayed specified time, wait All write operations are completed, if completing to then follow the steps G4;
G4, Flash enter write-protect state;
G5, with backup power source powered operation, while whether being powered on preset frequency detection system, if so, releasing Flash Write-protect state, and execute step F;If it is not, backup power source electricity is then waited to deplete, the complete power down of system.
Preferably, in the step G3, further includes: stop initiating new read operation, if existing in commission in system Read operation stops the read operation in execution, display system power down information.
The protection and restoration methods of the preferred embedded file system, the backup power source are capacitor or battery.
The protection and restoration methods of the preferred embedded file system, the specified time are 50-100ms;Institute Stating preset frequency is 50-100Hz.
A kind of preferred system using the method, comprising:
Detection module for detection system data validity;
The recovery module restored for system data.
The system, the detection module include for the area carry Mount whether the successful carry detection unit of carry, For the whether effective Determination unit of detection data.
The system further includes the power down protection module for protecting system after system is powered down;The detection module is also Including for detection system whether the detection of power loss unit of power down.
A kind of preferred equipment using the system, comprising:
The area UPDATE: the last 4K of subregion establishes upgrade file and control information;
The area PARAM: default parameters/real time execution parameter stores subregion;
The area LOG: record terminal power-on and power-off, the information that parameter is destroyed and system module generates;
The area RTTAPP: each required by task data of storage system are gathered in this;
The area RAW: it is directly managed by system by address, data needed for system operation is saved in the form of record.
Compared to the prior art, the protection and restoration methods of embedded file system provided by the invention, in system electrification Afterwards, since the area Mount carry, enter safeguard measure, in order to ensure system operation accuracy, to the area DBR, FAT area, The data accuracy in the area DIR is detected, and takes corresponding recovery operation, from the angle safeguards system of system data accuracy Normal operation, be that those skilled in the art is not thinkable, in the protection of embedded system have tremendous improvement.
Detailed description of the invention
Fig. 1 is the Booting sequence figure of protection provided by the present application and restoration methods.
Fig. 2 is Parameter reconstruction operational flowchart provided by the present application.
Fig. 3 is power down protection flow chart provided by the present application.
Specific embodiment
The present invention provides the protection and restoration methods of embedded file system, for make the purpose of the application, technical solution and Effect is clearer, clear, and the application is further described as follows in conjunction with drawings and embodiments.It should be appreciated that herein Described specific embodiment only to explain the application, is not used to limit the application.
Embodiment 1
Attached drawing 1 is please referred to, the application provides the protection and restoration methods of a kind of embedded file system, specifically includes:
After S10, embedded system electrification reset, system correlation and peripheral hardware initialization are carried out;
Whether carry is successful for S20, the operation of the detection area carry Mount, if so then execute step S30;If it is not, thening follow the steps S40;
S30, whether data, which effectively detect, is carried out to the area DBR, FAT area, the area DIR, if so, thening follow the steps S60;If it is not, Then follow the steps S50;
S40, system execute formatting to the area Mount, after the completion of formatting successfully, execute step S20;If formatting does not have It successfully completes, then prompts error message;
S50, to the area DBR, FAT area, the area DIR again partition format, after partition format success, system, which executes, restores ginseng Number operation, and execute step S30;If partition format and/or recovery parameter manipulation do not succeed, error message is prompted;
S60, system operate normally.
After embedded file system electrification reset, the carry initialization of embedded file system and each subregion is carried out.It is right File partition carries out carry Mount (order, carry file) operation first will be to institute if repeatedly carry subregion is unsuccessful Want the partition format of carry.After carry success, to DBR (DOS BOOT Record, dos boot record) area, FAT (File Allocation Table, file configuration table) area, DIR (Directory, catalogue) area validity detected.If it was found that The area DBR, FAT area, the area DIR exist abnormal, will be formatted to it and Parameter reconstruction operation, so can safeguards system exist All operating parameters of operation incipient stage are all initial data that is effective and being all last operation, will not be because of accident caused by Abnormal data is run, and the stability of system is greatly improved.
In specific implementation, the area DBR, the FAT area, the area DIR flash (Flash EEPROM Memory, Flash memory) on initial position and size it is as shown in the table:
Zone name Partition size Partition address range
The area DBR 0.5KB 0x000000~0x0001FF
FAT area 60KB 0x000200~0x00F1FF
The area DIR 16KB 0x00F200~0x0131FF
The area DATA 14.8MB 0x013200~0xEDFFFF
Initial position and size of the subregion in file system are as shown in the table:
Zone name Subregion starts sector Partition size secto
The area DBR B_dbr=0 N_dbr=1
FAT area B_fat=1 N_fat=120
The area DIR B_dir=121 N_dir=32
The area DATA B_data=153 N_data=7578
The most beginning of subregion is finally really to deposit file content followed by FAT area and the area DIR for the area DBR The area DATA.The internal space size distributed according to subregion of format output function f_format (), can calculate the start bit in each area It sets and the size in each area.After formatting, correlating markings can be written in each area in file system, and press for FAT area or the area DIR It is required that specified region all clearly at 0x00.
In practical applications, the corrupted data in the FAT area and the area DIR will cause the catalogue of file system and file can not Correct read-write, can cause the damage of entire subregion when serious.After system electrification, by f_mount () function from having formatted In subregion, all information of the subregions such as the area DBR, FAT table, the area DIR, the starting position of data field, size, divisional type are read, For used in subregion validation checking.
It can carry out Sector (sector) in relevant range in file system use process to distribute, and as required in relevant range Specified data are written.It is not in the case where entire Sector is all 0xFF.Think if entire Sector occur and being all 0xFF This Sector is wiped free of and/or is not written, or write-in is random number evidence.If FAT table and directory area are a total of more than finger The fixed all 0xFF of Sector, then it is assumed that FAT table or catalogue have occurred and that damage.The area system Hui Dui DBR, FAT table, the area DIR Initial position, size detected, if being more than specified numerical value, then it is assumed that subregion generates damage.If system detection is damaged to subregion It is bad, f_mkfs () can be called to be formatted subregion, then re-start carry Mount operation.
Embodiment 2
Preferably, further include step S30 ' (non-diagram) in the step S30 present invention also provides scheme once: if Whether the area DBR, the FAT area, the data in the area DIR are effective, then effectively examine to the data in DATA (data) area It surveys, if so, thening follow the steps S60;If it is not, then executing recovery parameter manipulation.
If the data verification in the area DATA is unsuccessful, also system can be caused various problems occur, generate unpredictable fortune Row mistake.Judge so to damage subregion, format manipulation is then executed when subregion damages, if the area DATA occurs Damage will then execute Parameter reconstruction operation.It is damaged if parameter region, it is extensive that system can call prm_ret_files () to carry out parameter It is multiple, it is ensured that parameter needed for system is normal, guarantees that system operates normally.
Please refer to attached drawing 2, in embodiment described above, the recovery parameter manipulation specifically includes the following steps:
S51, file backup/restoration record information in apterium is read;
S52, file record head information is read;
S53, file record data are read;
Whether whether S54, the verification record data legal with backup/restoration record information, if so then execute step Rapid S55;If it is not, thening follow the steps S56;
S55, according to record filename, respective file is generated in subregion, and whether verify the respective file normal, if It is to then follow the steps S56;If it is not, thening follow the steps S54;
S56, whether All Files all restore to complete for verification, if system file Backup and Restore record is then arranged, execute step Rapid S60;If it is not, thening follow the steps S53.
Concrete operations are as follows:
Parameter backup: before product export, prm_bak_files () need to be called default parameters full backup to apterium;In In system operation, real-time parameter or system caused by the system of user's confirmation can also call prm_bak_ Files () backups to apterium.As long as such as have parameter modification as main website issues in the process of running, infrared, USB flash disk upgrading etc. is all Relevant parameter backup is carried out, prm_bak_onefile () is called to carry out single parameter backup.Ensure backup area and parameter region Parameter real-time synchronization, it is always newest;
The storage of parameter in apterium: what the preceding 4K in apterium was saved is backup/restoration record information (32 byte), backs up, is extensive Multiple mark, backup restore number.Each 32 byte of parameter foremost is File header information: filename, file size, file CRC (Cyclic Redundancy Check, cyclic redundancy check) verification, 32nd byte of each file content from File header information Start to store.Real-time parameter is stored since 4K, each real-time parameter distributes 16K, and real-time parameter, which has been stored, followed by be stored out Factory's default parameters;
Parameter reconstruction foundation: if system detection is damaged to system parameter, reading file backup recovery first records information, really Recognize whether apterium carried out backup.If apterium exist backup, next read file record head information, mainly include filename, File size, file CRC check.File record data are read according to file size, CRC check are carried out to data, and will calculate CRC and File header information in CRC comparison.Then corresponding document, system school are generated in subregion according to record filename Whether normal test the file generated in subregion.Followed by next file access pattern, after the completion of All Files restore, setting System file recovery record relevant information, completion of entirely resuming work;
In aforesaid operations, the interrecord structure of file backup recovery is as follows:
The message structure of file is as follows:
In actual implementation, the 16M Spi Data Flash partition figure of system is as follows:
UPDATE: upgrading area, for serial ports, USB, remote upgrade file terminal.The last 4K of subregion establishes upgrading text Part and control information, such as upgrade whether, upgrade file length, verification, markers information.
PARAM: parameter region, file system are supported to read, and factory default parameters, real time execution parameter stores this subregion.
LOG: log area, file system are supported to read, and the black box of terminal, record terminal power-on and power-off, parameter are destroyed and be The various important informations that module of uniting generates.
RTTAPP: data field, file system are supported to read, and each required by task data of system are gathered in this.
RAW: file system is not supported in parameter backup area, apterium, is directly managed by system by address, with the shape of record Significant data needed for formula saves system operation.When data subregion is destroyed, it is raw data need to be copied from RAW parameter backup area At corresponding document.
Embodiment 3
Please refer to attached drawing 3, it is preferred that the application also provides power down protection operation, the guarantor of the embedded file system Shield and restoration methods, further comprise the steps of:
S70, system real-time detection whether power down, if so, system execute power down protection mode;If it is not, thening follow the steps S60。
The protection and restoration methods of the embedded file system, the step S70 include:
S71, with preset frequency detection system whether power down, if so, thening follow the steps S72;If it is not, thening follow the steps S60;
The intermediate data that generates in S72, the operation of preservation system, and generate power down record, setting system is powered down mark;
S73, stop initiating new write operation, if there is write operation in commission in system, be delayed specified time, wait All write operations are completed, if completing to then follow the steps S74;
S74, Flash enter write-protect state;
S75, with backup power source powered operation, while whether being powered on preset frequency detection system, if so, releasing Flash write-protect state, and execute step S60;If it is not, backup power source electricity is then waited to deplete, the complete power down of system.
In actual operation, system operate normally, with preset frequency detection system whether power down.Occur if system is powered down, System can be identified and be made a response rapidly.The file for needing to write or the file write, system allow its all write-in Flash In.It writes rear system and no longer initiates new write operation, open Flash write-protect after the specified time that is delayed, allow Flash to enter and write guarantor Shield state, prevents file system corruption.
In conclusion the protection of embedded type file provided by the present application and restoration methods are to start to be counted in system starting According to accuracy detection can be solved the problems, such as with specific aim corresponding and after detecting data exception, avoid system run-time error System exception brought by data, those skilled in the art's emphasis of interest are all abnormal caused by system is running Data or abnormal operation, so the application is the i.e. accurate technical solution of safeguards system data at the beginning of the operation of system, this It is those skilled in the art institute not it is contemplated that not taking corresponding scheme.
It, can technical solution according to the application and its Shen it is understood that for those of ordinary skills It please conceive and be subject to equivalent substitution or change, and all these changes or replacement all should belong to the guarantor of the application the attached claims Protect range.

Claims (7)

1. the protection and restoration methods of a kind of embedded file system, which comprises the following steps:
A, after embedded system electrification reset, system correlation and peripheral hardware initialization are carried out;
B, whether carry is successful for the operation of the detection area carry Mount, if so then execute step C;If it is not, thening follow the steps D;
C, whether data, which effectively detect, is carried out to the area DBR, FAT area, the area DIR, if so, thening follow the steps F;If it is not, then executing step Rapid E;
D, system executes formatting to the area Mount, after the completion of formatting successfully, executes step B;If formatting without having succeeded At then prompting error message;
E, to the area DBR, the FAT area, the area DIR again partition format, after partition format success, system is executed Restore parameter manipulation, and executes step C;If partition format and/or recovery parameter manipulation do not succeed, wrong letter is prompted Breath;
F, system operates normally.
2. the protection and restoration methods of embedded file system according to claim 1, which is characterized in that the step C In further include step C ': if the area DBR, the FAT area, the data in the area DIR are effective, to the data in the area DATA whether It is effectively detected, if so, thening follow the steps F;If it is not, then executing recovery parameter manipulation.
3. the protection and restoration methods of embedded file system according to claim 1 or 2, which is characterized in that described extensive Multiple parameter manipulation specifically includes the following steps:
E1, file backup/restoration record information in apterium is read;
E2, file record head information is read;
E3, file record data are read;
Whether whether E4, the verification record data legal with backup/restoration record information, if so then execute step E5; If it is not, thening follow the steps E6;
E5, according to record filename, respective file is generated in subregion, and whether verify the respective file normal, if then Execute step E6;If it is not, thening follow the steps E4;
E6, whether All Files all restore to complete for verification, if system file Backup and Restore record is then arranged, execute step F;If It is no, then follow the steps E3.
4. the protection and restoration methods of embedded file system according to claim 3, which is characterized in that step E is also wrapped Include step: E0, by default parameters/real-time parameter full backup to apterium.
5. the protection and restoration methods of embedded file system according to claim 3, which is characterized in that the record head Information includes: the CRC check of filename, file size and file;
The obtained legal state of the verification in the step E4 refers to: file record head information is read, according to text Part length reads file record data, carries out CRC check to data, and by CRC pairs in the CRC and File header information of calculating Than the consistent state of information data.
6. the protection and restoration methods of embedded file system according to claim 1, which is characterized in that further include step It is rapid:
G, system real-time detection whether power down, if so, system execute power down protection mode;If it is not, thening follow the steps F.
7. the protection and restoration methods of embedded file system according to claim 6, which is characterized in that the step G Include:
G1, with preset frequency detection system whether power down, if so, thening follow the steps G2;If it is not, thening follow the steps F;
The intermediate data that generates in G2, the operation of preservation system, and generate power down record, setting system is powered down mark;
G3, stop initiating new write operation, if there is write operation in commission in system, be delayed specified time, wait all Write operation is completed, if completing to then follow the steps G4;
G4, Flash enter write-protect state;
G5, with backup power source powered operation, while whether being powered on preset frequency detection system, if so, releasing Flash writes guarantor Shield state, and execute step F;If it is not, backup power source electricity is then waited to deplete, the complete power down of system.
CN201910559628.8A 2019-06-26 2019-06-26 Protection and recovery method for embedded file system Active CN110389853B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910559628.8A CN110389853B (en) 2019-06-26 2019-06-26 Protection and recovery method for embedded file system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910559628.8A CN110389853B (en) 2019-06-26 2019-06-26 Protection and recovery method for embedded file system

Publications (2)

Publication Number Publication Date
CN110389853A true CN110389853A (en) 2019-10-29
CN110389853B CN110389853B (en) 2024-01-02

Family

ID=68285960

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910559628.8A Active CN110389853B (en) 2019-06-26 2019-06-26 Protection and recovery method for embedded file system

Country Status (1)

Country Link
CN (1) CN110389853B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111209132A (en) * 2019-12-31 2020-05-29 航天信息股份有限公司 Embedded system, power failure protection method, electronic device and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6205558B1 (en) * 1998-10-07 2001-03-20 Symantec Corporation Recovery of file systems after modification failure
US20050028031A1 (en) * 2003-07-28 2005-02-03 Matsushita Electric Industrial Co., Ltd. Data recovery method and data recording apparatus
US20080028004A1 (en) * 2004-06-04 2008-01-31 Chang-Ju Lee Apparatus and Method for Protecting System Data on Computer Hard-Disk
CN101477482A (en) * 2008-10-14 2009-07-08 深圳市共进电子有限公司 Method for recovering flash memory data at power-off of built-in Linux system
CN101539891A (en) * 2008-03-17 2009-09-23 凤凰微电子(中国)有限公司 Embedded type flash memory, storage system and method for power fail safeguard of data
CN107943414A (en) * 2017-10-16 2018-04-20 积成电子股份有限公司 The file partition of built-in Linux and data read-write method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6205558B1 (en) * 1998-10-07 2001-03-20 Symantec Corporation Recovery of file systems after modification failure
US20050028031A1 (en) * 2003-07-28 2005-02-03 Matsushita Electric Industrial Co., Ltd. Data recovery method and data recording apparatus
US20080028004A1 (en) * 2004-06-04 2008-01-31 Chang-Ju Lee Apparatus and Method for Protecting System Data on Computer Hard-Disk
CN101539891A (en) * 2008-03-17 2009-09-23 凤凰微电子(中国)有限公司 Embedded type flash memory, storage system and method for power fail safeguard of data
CN101477482A (en) * 2008-10-14 2009-07-08 深圳市共进电子有限公司 Method for recovering flash memory data at power-off of built-in Linux system
CN107943414A (en) * 2017-10-16 2018-04-20 积成电子股份有限公司 The file partition of built-in Linux and data read-write method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曹俊勇等: "嵌入式Linux中针对掉电问题的数据保护技术研究", 《计算机工程与设计》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111209132A (en) * 2019-12-31 2020-05-29 航天信息股份有限公司 Embedded system, power failure protection method, electronic device and storage medium

Also Published As

Publication number Publication date
CN110389853B (en) 2024-01-02

Similar Documents

Publication Publication Date Title
US9286164B2 (en) Electronic device to restore MBR, method thereof, and computer-readable medium
CN102722394B (en) Start upgrading method of embedded equipment
US20100058314A1 (en) Computer System and Related Method of Logging BIOS Update Operation
US20130073819A1 (en) Efficient file system metadata scanning using scoped snapshots
CN108646982B (en) Automatic data restoration method and device based on UBIFS
CN102890657A (en) Method for reducing data read-write errors of EEPROM (electrically erasable programmable read-only memory)
CN102023908A (en) Method and device for backing up boot program
CN106227625B (en) A kind of restoration methods and system of the flash data damaged by power down
TWI489466B (en) Memory erasing method, memory controller and memory storage apparatus
CN111143104A (en) Memory exception processing method and system, electronic device and storage medium
CN101634960A (en) Method for revising BIOS parameter and regenerating checksum
CN108062262A (en) Operating system backup-and-restore method and its system based on storage sector data
CN101482837B (en) Error correction method and apparatus for flash memory file system
CN108319520A (en) Mobile device alternate operating system based on secure storage
TWI486957B (en) Method, device and operating system for processing, using a nand flash memory burn data
CN110502281A (en) A kind of method of embedded device starting linux kernel and file system
CN109445691B (en) Method and device for improving FTL algorithm development and verification efficiency
CN103207816A (en) Linux system repairing method
CN104751062A (en) Method and device improving operation system reliability
CN111737051B (en) Trim data verification test method, device and system of SSD (solid State disk)
CN115840579A (en) FPGA remote updating method, system, chip mounter and storage medium
CN110389853A (en) A kind of protection and restoration methods of embedded file system
TWI493341B (en) Memory storage device and repairing method thereof
WO2019062147A1 (en) Reading and writing method and apparatus for counter, device, and storage medium
CN105630523A (en) Computer BIOS data recovery system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant