Method for implementing checkpoint of Linux program at user level based on virtual kernel object

A technology of kernel objects and implementation methods, applied in multi-programming devices, software testing/debugging, etc., can solve problems such as execution failure, inability to recover strictly and consistently, logic errors, etc., and achieve the effect of efficient software debugging

Inactive Publication Date: 2007-12-26
HUNAN UNIV
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, its implementation mechanism is related to the operating system platform, and the platform portability is poor.
The advantage of the application-level checkpoint is that it can achieve platform independence and can be transplanted between different operating systems. The disadvantage is that it has many restrictions on the application and can only be effective for some applications.
There will be the following two problems when restarting and restoring execution: 1) use the original file reference (h=1) to access the restored kernel file object (because the file reference cannot be restored strictly and consistently, the file reference has become h=3), and the execution fails; 2) Even if there is no reference problem after recovery, the checkpoint information is used to restore the file pointer to p=5 during recovery, and after the call to set the file pointer API returns, p=8, but it should be equal to 5, resulting in a logic error

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing checkpoint of Linux program at user level based on virtual kernel object
  • Method for implementing checkpoint of Linux program at user level based on virtual kernel object
  • Method for implementing checkpoint of Linux program at user level based on virtual kernel object

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Refer to Figure 4. In this embodiment: at the time of the checkpoint, there are three threads in the process: T1, T2, T3, and there are two synchronization objects: mutexes M1, M2. Thread T1 holds M1 and is in the execution state; thread T2 holds M2, which calls the pthread_mutex_lock() system API, and is in the waiting state to further wait for M1; thread T3 calls the pthread_mutex_lock() system API and is in the waiting state, waiting for M2. At the checkpoint moment, the checkpoint thread sets the checkpoint flag, and calls signal() to send checkpoint interrupt signals to threads T1, T2, and T3. T1, T2, and T3 are interrupted and go to the checkpoint interrupt routine. In the checkpoint interrupt routine (see Figure 3①), T1 checks that the checkpoint flag is set and its own execution position flag is in the reset state, so it calls the checkpoint routine ④ (see Figure 3④). In the checkpoint routine ④, T1 releases M1, calls the sigsetjmp() system API to obtain the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for realizing user grade of Linux program check point based on virtual kernel object includes inserting check point layer between application layer and system API layer, forming check point layer by application linear program check point control layer and mapping layer of kernel object state track-recording to object quotation, repositioning call of application layer on system APZ to check point layer, executing position flag on application linear program-setting, controlling check point of application linear program not to be dropped into said mapping layer and system API layer as well as kernel layer.

Description

technical field [0001] The invention relates to a method for capturing the process state of a Linux application program and recovering the process state to make it continue to execute, in particular to a user-level implementation method of a Linux program checkpoint based on a virtual kernel object. Background technique [0002] Process checkpoints can be implemented at the operating system level, user level, or application level, each with its own characteristics. The process checkpoint implemented at the operating system level is transparent to the user program, and it is easy to obtain the kernel data structure of the process, but it needs to modify the system kernel, its configurability and portability are poor, and the checkpoint overhead is also large. The user-level process checkpoint compiles the implementation part of the checkpoint function into a library and links it to the application program, which can be transparent to the application program, and has the chara...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/46G06F11/36
Inventor 杨金民张大方黎文伟
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products