CN107239320A - The method of process status in real-time preservation client computer based on virtualization technology - Google Patents

The method of process status in real-time preservation client computer based on virtualization technology Download PDF

Info

Publication number
CN107239320A
CN107239320A CN201710233176.5A CN201710233176A CN107239320A CN 107239320 A CN107239320 A CN 107239320A CN 201710233176 A CN201710233176 A CN 201710233176A CN 107239320 A CN107239320 A CN 107239320A
Authority
CN
China
Prior art keywords
client computer
absorbed
virtualization
backup
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710233176.5A
Other languages
Chinese (zh)
Inventor
贾晓启
李津津
杜海超
白璐
武希耀
唐静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201710233176.5A priority Critical patent/CN107239320A/en
Publication of CN107239320A publication Critical patent/CN107239320A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Retry When Errors Occur (AREA)
  • Hardware Redundancy (AREA)

Abstract

The present invention relates to a kind of method of process status in real-time preservation client computer based on virtualization technology.This method includes:1) PID of specific process in client computer is notified to give virtualization supervisory layers;2) monitoring process is dispatched in virtualization supervisory layers, and when specific process is scheduled, client computer is actively absorbed in virtualization supervisory layers, ad-hoc location injecting codes of the virtualization supervisory layers in client internal memory;3) after Client Restore is performed, perform the code of injection to complete the backup of process status;4) active for realizing client computer by the code of injection is absorbed in, and changes the controlling stream of client computer current process according to the process being absorbed in;5) position of code injection is recovered when needing recovering process context, while waking up the process status of backup.The present invention is backed up with process entity form when process context state needs to be saved in a client, is needed can directly to run the process during recovery after and is resumed work without extra internal memory.

Description

The method of process status in real-time preservation client computer based on virtualization technology
Technical field
The invention belongs to technical field of virtualization, it is related to process status in the real-time preservation client computer based on virtualization technology Method, more particularly to a kind of being not required to based on virtualization technology change client computer kernel, transparent to client computer process shape State store method.
Background technology
The topmost effect of virtualization technology is the service efficiency for solving physical resource, and monitor of virtual machine substitutes operation system Level where system kernel, is carried out abstract to bottom physical resource.Hardware is owned by the distribution and management of virtualization layer by upper strata Virtual machine is shared, and the virtual machine on upper strata is created, dispatched and distributed resource by virtualization layer.It is virtual on virtualization layer Machine is mutually isolated, it is necessary to need to be controlled and managed by virtualization layer when mutually accessing or communicate.Virtualization technology is from birth So far, a variety of correlation techniques and application have been derived.Virtualization technology is due to characteristics, quilt such as its own isolation, access and interventions It is widely used in safety protection field.These features enable the security tool effective monitoring virtual machine based on virtualization architecture Internal state, while resisting the attack of monitored internal system.On the whole, rogue program is monitored using virtualization technology and is System is placed in independent virtualized environment, is responsible for monitoring to virtual machine, can accomplish effectively to resist rogue program hide with Attack meanses, and easily scalable and maintenance.
For the client computer on virtual platform, the backup of virtual machine state is an important need, especially when When virtual machine internal or residing platform meet with attack, answer stateful, it is necessary under attack to ensure that virtual machine is quickly recovered to Some or multiple moment carry out state backup, be rapidly achieved normal operating condition so as to after.To virtual machine state There are a variety of objects, such as virtual disk, process context, CPU in backup.Common virtual machine backup passes through snapshot, clone etc. Mode is carried out, and the storage after backup mainly copies to target data in storage device.It is generally necessary to suspend the fortune of virtual machine OK, backed up internal memory as file, or Memory Backup is realized by the method for dynamic migration.
Backing up in realtime for virtual machine is to solve backup checkpoint and the method for virtual machine current operating conditions inconsistence problems One of, to accomplish to back up in realtime, it is necessary to any change of virtual-machine data is real-time transmitted on backup server, but data Transmission be constantly present delay, this is the subject matter backed up in realtime.Cully et al. propose Remus (Cully B, Lefebvre G,Meyer D,et al.Remus:high availability via asynchronous virtual machine replication[C]//Usenix Symposium on Networked Systems Design and Implementation.USENIX Association,2008:It is 161-174.) that the virtual machine based on Xen is backed up in realtime solution Scheme, it carries out complete copy to virtual machine in file-level, replicates every time just for labeled as dirty page progress, this guarantee The high efficiency of backup, is consistent virtual machine state and backup file.Back up checkpoint and check virtual by high-frequency Machine state is determined, then carries out incremental backup to CPU, internal memory and hard disk when capturing the change of execution state. Parallax(Warfield A,Ross R,Fraser K,et al.Parallax:Managing Storage for a Million Machines[C]//Hotos'05:,Workshop on Hot Topics in Operating Systems, June 12-15,2005,Santa Fe,New Mexico,Usa.DBLP,2005:It it is 4-4.) one based on the how virtual of Xen Machine management system, it is mainly used in solving the virtual machine storage problem of million number of levels, and its Important Thought is all storages Resource carries out unified addressing, and sets up virtual disk mirror image VDI, each VDI one root node of correspondence, its sub- section for virtual machine Point is the space for its distribution.Snapshot is pointed to current VDI root nodes when making snapshot, and its all child node is set to It is read-only.
The backup that mode based on log recording is carried out be mainly used in system it is under attack after playback, it is representative Achievement in research has Revirt systems (Dunlap G W, King S T, Cinar S, et al.ReVirt:Enabling intrusion analysis through virtual-machine logging and replay[J].ACM SIGOPS Operating Systems Review,2002,36(SI):211-224.), it carries out log recording, note on VMM to system Copyist's part includes asynchronous interrupt, outside input etc., and in terms of being used in intrusion detection, it can be usurped by rogue program in system In the case of changing, implementation procedure under attack is reset, information is provided for intrusion detection analysis.Revirt needs to grasp client computer Modified as system kernel, it is opaque to client computer.
Above achievement in research is that process aspect is based on the research of migrating technology on virtual machine-level other backup.Migration It is, in monitored virtual machine node collapse, to reconfigure and hand on another node and run, migrate usually with process For unit.The target of migration is to preserve running state of a process, it is can continue to operation in another node, this point and process There is general character in backup.Process migration need preserve state include the process address space, register context, communications status and Other information related to the management of process of kernel.MOSIX(Barak A,La'Adan O.The MOSIX multicomputer operating system for high performance cluster computing[J] .Future Generation Computer Systems,1998,13(4-5):361-372.) it is by changing operating system The process migration system that kernel is realized, PRM (Song G, Thomas S, Amato N M.A general framework for PRM motion planning[C]//IEEE International Conference on Robotics and Automation,2003.Proceedings.ICRA.IEEE,2003:4445-4450vol.3.) realized based on client layer.This A little methods belong to full copy type, and recovering process has larger retardance on the target node.
In the above scenario, the research in units of process to be based on migrating, and back up using whole virtual machine state as It is main.If necessary to which for specific process is backed up and directly backs up whole virtual machine, then larger space expense can be brought.And With the presence of the certain retardance of process migration technology, be short of at the consistent aspect of process status.
The content of the invention
In view of the above-mentioned problems, the present invention provides process status in a kind of real-time preservation client computer based on virtualization technology Method.When process context state needs to be saved in some particular moment client computer, it will be carried out with process entity form standby Part, and when certain moment needs recovering process context after, can directly run the process extensive without extra internal memory Return to work work.
The technical solution adopted by the present invention is as follows:
A kind of method of process status in real-time preservation client computer based on virtualization technology, its step includes:
1) PID (Process Identification, Process identifier) of specific process in client computer is notified to void Planization supervisory layers (Virtual Machine Monitor, VMM);
2) monitoring process is dispatched in VMM, and when specific process is scheduled, client computer is actively absorbed in VMM, and VMM is in client computer Ad-hoc location injecting codes in internal memory;
3) after Client Restore is performed, perform the code of injection to complete the backup of process status;
4) active for realizing client computer by the code of injection is absorbed in, and client computer current process is changed according to the process being absorbed in Controlling stream;
5) position of code injection is recovered when needing recovering process context, while waking up the process shape of backup State.
4 parts are classified into below the particular content of above step is described in detail.
1. after VMM receives the PID of specific process in client computer, the task_struct structures of process are obtained according to PID, And then obtain page directory tables address, the i.e. value of cr3 registers.The monitoring to cr3 register writes is then turned on, when cr3 is posted When storage is written into the page directory tables address of specified process, then start to ad-hoc location injecting codes in client internal memory.
2. the function that the code of injection is realized, which includes injection particular system, calls and realizes that the active of client computer is absorbed in. Linux system is called to traditional system using 0x80 implement of interruption function, and although redaction has sysenter/syscall and refer to The rapid system call instruction of order, but still compatibility is instructed to int80, therefore this method selection int80 instruction execution systems are adjusted Injection.The reason for client computer is absorbed in has a variety of, and such as client computer performs privileged instruction, and client computer accesses physical resource etc., such as Fruit selects the conventional reason that is absorbed in repeatedly invalid situation about being absorbed in then easily occur.Client computer is absorbed in reason and can controlled by VMM System a, part is absorbed in reason and is defaulted as being not turned on being absorbed in VMM.What this method selection VMM acquiescences were not turned on is absorbed in reason, and Client computer itself will not frequently occur this mode for being absorbed in reason and realize that active is absorbed in, and select int3 instructions to realize here.
3. the position selection of injecting codes will perform the generation of injection in user mode codes section after Client Restore right of execution Code, and complete the backup of process status.The backup process of generation needs to be specially treated, because backup process is also to be adjusted The process of degree, to prevent backup process from losing context state, it is necessary to change the scheduling to backup process, this method is used and is absorbed in The mode that injection particular system is called after VMM realizes the change to the process scheduling situation.
4. the context of process needs to be resumed, then change the dispatch situation of backup process again, allow the process energy quilt Normal consistency.The position of injecting codes in internal memory is recovered simultaneously.
The beneficial effects of the invention are as follows:
When process context state needs to be saved in client computer, client computer need not assist VMM to do state and preserve work Make, i.e., running state of process is unaffected in client computer;When certain moment needs recovering process context after, Neng Gouzhi Connect operation the process resume work without extra internal memory.In whole process, client computer will be unaware that controlling stream Change, and client computer kernel code need not be modified and be installed kernel module.
Brief description of the drawings
Fig. 1 is that process status of the present invention preserves process chart.
Fig. 2 is that process status of the present invention recovers process chart.
Embodiment
The present invention is explained in further detail with reference to embodiment and accompanying drawing.It is understood that described Embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, this area The every other embodiment that technical staff is obtained under the premise of creative work is not made, belongs to the model that the present invention is protected Enclose.
Embodiment one:
It is that one fork system of process injection is called, when Client Restore is held to carry out state backup to specific process This system will be performed during row call and automatically create out a subprocess, here using this subprocess as backup process, and father enters Cheng Zhengchang is performed.Parent process is called after the subprocess that fork is created that, in addition it is also necessary to call wait functions to wait subprocess state to become Change, wait functions can block parent process, when subprocess end of run, wait functions are returned, parent process receives subprocess It is subprocess Resource recovery after the signal of end of run.If parent process does not call wait functions to wait subprocess running status Change, then resource will not be recovered and turn into zombie process after subprocess end of run.If however, parent process is prior to subprocess End of run, then a process, i.e. init processes can turn into the parent process of subprocess, and be its time in subprocess end of run Receive resource.The system calls carry out process backup using fork systems, and the backup that follow-up parent process is bound to prior to its establishment is entered Journey terminates operation, therefore backup process will not be changed into zombie process, and its resource can be reclaimed correctly.
To change, client computer is ensuing to perform flow, it is necessary to change 4 bytes of process code section.Client is obtained first Eip register values when machine is absorbed in, i.e., the linear address for the next instruction that will be performed.Then four started herein are changed Byte of memory, is changed to int3, int80, int3, the machine code of wherein int3 instructions is CC, and int80 machine code is CD80, three instructions just take four bytes, and amended nybble content is CC CD 80CC.Wherein, int80 instructions are used Called to produce fork systems, the active that int3 instructions are used for producing client computer to VMM is absorbed in, and needs exist for the active of client computer It is that the code changed needs to be resumed to be absorbed in reason.Also need to recover the content of this section of code script due to after, because It is noted that preserving the original content in the position so that follow-up is resumed work before this modification.
Why to inject two int3 and interrupt makes client computer active generation be absorbed in twice, is because modification is that internal memory is complete The code of office, other unrelated processes may also share this one page and perform the code that this section is changed, if allowing them all to go to hold This section of code of row can increase complexity.At the time of the time point being resumed at code revision is that backup process is released, if only One int3 of injection is interrupted, and before this, as long as unrelated process is gone to here, all can first go to perform int80 then due to Int3 and actively be absorbed in, if at this moment again go recover the unrelated process context, the value for facing eax registers has been lost The problem of losing and can not recover.Therefore int80 execution before, more injection one int3 make its system call execution before just Actively it is absorbed in, so VMM can be allowed to be judged according to the situation of being absorbed in and make correct processing.The processing being absorbed in after VMM is shown in Fig. 1, as shown in the drawing, if be absorbed in from first int3, no matter the process is unrelated process or controlled process, is required to mould Intend the original code implementation effect in the position changed;If be absorbed in from second int3, judge the process for controlled process Or the subprocess that backup is produced, if controlled process then records function call and returns to the subprocess PID produced, if subprocess Then specifically handled according to whether discharging the process.
Embodiment two:
To realize that process status is backed up, the process being created that should be suspended in this state, without the execution that should be scheduled.Place Reason process is as shown in Figure 2.To make process not be scheduled, called using injection sched_yield systems allow the process to sleep here. The same fork of method for implanting, that is, it is sched_yield system call numbers to change eax registers, and changing eip registers points to it Int80 IAes.If detecting backup process to be scheduled, sched_yield is injected, until needing recovering process.
If VMM receives process status and recovers signal, when generation backup process is absorbed in, it is necessary to recover its fortune OK, injection sched_yield systems are now needed not continue to call, but the code content of modification is recovered.However, Be now in dormant process it is more than this, it is also possible to there is the backup process that other needs are resumed.If Judge to need to be resumed when one backup process is absorbed in recover original code content with regard to horse back, then other backup process are gone to , will be because mistake occurs in context and can not continue to run with when herein.Therefore, when first backup process is absorbed in, it is impossible to Recover original code content at once, but original code implementation effect is first simulated for it, by corresponding registers, it is specific in Deposit and change into the content after code is performed, called while not reinjecting sched_yield systems.This backup process subsequently will not It can be absorbed in due to second int3.When the process of recovery in need be all waken up, i.e., last backup process exists When second int3 is absorbed in, then recover original code.Code recover after, will not any further process because int3 occur It is absorbed in.

Claims (8)

1. a kind of method of process status in real-time preservation client computer based on virtualization technology, its step includes:
1) PID of specific process in client computer is notified to give virtualization supervisory layers;
2) monitoring process is dispatched in virtualization supervisory layers, and when specific process is scheduled, client computer is actively absorbed in virtualization monitoring Layer, ad-hoc location injecting codes of the virtualization supervisory layers in client internal memory;
3) after Client Restore is performed, perform the code of injection to complete the backup of process status;
4) active for realizing client computer by the code of injection is absorbed in, and changes the control of client computer current process according to the process being absorbed in System stream;
5) position of code injection is recovered when needing recovering process context, while waking up the process status of backup.
2. the method as described in claim 1, it is characterised in that:Virtualization supervisory layers receive the PID of specific process in client computer Afterwards, the task_struct structures of process are obtained according to PID, and then obtain page directory tables address, the i.e. value of cr3 registers;Then The monitoring to cr3 register writes is opened, when cr3 registers are written into the page directory tables address of specified process, is then started To ad-hoc location injecting codes in client internal memory.
3. the method as described in claim 1, it is characterised in that:The injection and client that system calls are realized by the code of injection The active of machine is absorbed in.
4. method as claimed in claim 3, it is characterised in that:The injection called by int80 instruction execution systems, passes through Int3 instructions realize that the active of client computer is absorbed in.
5. method as claimed in claim 4, it is characterised in that the method for injecting codes is in a client:Visitor is obtained first Eip register values when family machine is absorbed in, i.e., the linear address for the next instruction that will be performed;Then four started herein are changed Individual byte of memory, is changed to int3, int80, int3, and wherein int80 instructions are called for producing fork systems, int3 instructions It is absorbed in for producing client computer to the active for virtualizing supervisory layers.
6. the method as described in claim 1, it is characterised in that:Called using injection special system after virtualization supervisory layers is absorbed in Mode realize the change to backup process dispatch situation, with prevent backup process lose context state;Above and below process When text needs to be resumed, change the dispatch situation of backup process again, so that the process can be by normal consistency.
7. method as claimed in claim 6, it is characterised in that:Make entering for backup by injecting sched_yield systems and calling Journey is slept, and prevents it from the execution that is scheduled, until needing recovering process.
8. method as claimed in claim 7, it is characterised in that:If virtualization supervisory layers, which receive process status, recovers letter Number, then when generation backup process is absorbed in, recover its operation;If being in dormant backup process more than one, when Be first that it simulates original code implementation effect when first backup process is absorbed in, when the process of recovery in need all called out When waking up, then recover original code.
CN201710233176.5A 2017-04-11 2017-04-11 The method of process status in real-time preservation client computer based on virtualization technology Pending CN107239320A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710233176.5A CN107239320A (en) 2017-04-11 2017-04-11 The method of process status in real-time preservation client computer based on virtualization technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710233176.5A CN107239320A (en) 2017-04-11 2017-04-11 The method of process status in real-time preservation client computer based on virtualization technology

Publications (1)

Publication Number Publication Date
CN107239320A true CN107239320A (en) 2017-10-10

Family

ID=59983337

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710233176.5A Pending CN107239320A (en) 2017-04-11 2017-04-11 The method of process status in real-time preservation client computer based on virtualization technology

Country Status (1)

Country Link
CN (1) CN107239320A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020147544A1 (en) * 2019-01-18 2020-07-23 华为技术有限公司 Method and device for resuming execution of application, and computer

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040268347A1 (en) * 2003-06-26 2004-12-30 Knauerhase Robert C. Virtual machine management using processor state information
CN101405712A (en) * 2006-03-21 2009-04-08 英特尔公司 Framework for domain-specific run-time environment acceleration using virtualization technology
US20090276772A1 (en) * 2008-04-30 2009-11-05 Garrett Michael R Virtualization platform configured with virtual connect control
CN101968746A (en) * 2010-09-02 2011-02-09 北京航空航天大学 Method for implementing organizational architecture mode of kernel-based virtual machine (KVM)
CN103955438A (en) * 2014-05-21 2014-07-30 南京大学 Process memory protecting method based on auxiliary virtualization technology for hardware
CN104102528A (en) * 2014-07-14 2014-10-15 南京理工大学 Quick performance restoration method of virtual machine monitor

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040268347A1 (en) * 2003-06-26 2004-12-30 Knauerhase Robert C. Virtual machine management using processor state information
CN101405712A (en) * 2006-03-21 2009-04-08 英特尔公司 Framework for domain-specific run-time environment acceleration using virtualization technology
US20090276772A1 (en) * 2008-04-30 2009-11-05 Garrett Michael R Virtualization platform configured with virtual connect control
CN101968746A (en) * 2010-09-02 2011-02-09 北京航空航天大学 Method for implementing organizational architecture mode of kernel-based virtual machine (KVM)
CN103955438A (en) * 2014-05-21 2014-07-30 南京大学 Process memory protecting method based on auxiliary virtualization technology for hardware
CN104102528A (en) * 2014-07-14 2014-10-15 南京理工大学 Quick performance restoration method of virtual machine monitor

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李津津、贾晓启、杜海超1、王利朋: "基于虚拟化技术的有效提高***可用性的方法", 《计算机应用》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020147544A1 (en) * 2019-01-18 2020-07-23 华为技术有限公司 Method and device for resuming execution of application, and computer
CN111459623A (en) * 2019-01-18 2020-07-28 华为技术有限公司 Method and device for restoring running of application program and computer
CN111459623B (en) * 2019-01-18 2024-04-12 华为技术有限公司 Method, device and computer for restoring running of application program

Similar Documents

Publication Publication Date Title
US10884870B2 (en) Method and system for implementing consistency groups with virtual machines
US7313793B2 (en) Method for forking or migrating a virtual machine
US9417965B2 (en) Low overhead fault tolerance through hybrid checkpointing and replay
EP2053509B1 (en) System for and method of migrating one or more virtual machines
US8495316B2 (en) Efficient management of archival images of virtual machines having incremental snapshots
US7627728B1 (en) System and method for efficient generation of application snapshots
CN104407938B (en) A kind of a variety of granularity restoration methods after virtual machine image level backup
US9852198B1 (en) Method and system for fast generation of file system snapshot bitmap in virtual environment
CN101377750B (en) System and method for cluster fault toleration
US8121977B2 (en) Ensuring data persistence and consistency in enterprise storage backup systems
US7669020B1 (en) Host-based backup for virtual machines
CN103793288B (en) A kind of software watchdog system and method
CN111708488B (en) Distributed memory disk-based Ceph performance optimization method and device
US20230161674A1 (en) Live Migrating Virtual Machines to a Target Host Upon Fatal Memory Errors
CN107239320A (en) The method of process status in real-time preservation client computer based on virtualization technology
CN111459607A (en) Virtual server cluster building method, system and medium based on cloud desktop virtualization
US20230121338A1 (en) Virtual Machines Recoverable From Uncorrectable Memory Errors
Rosenblum et al. Implementing efficient fault containment for multiprocessors: confining faults in a shared-memory multiprocessor environment
Korotkevitch SQL Server Advanced Troubleshooting and Performance Tuning
Yao et al. Using Block Filter Device for Acceleration of Storage Synchronization on Fault-tolerant Virtual Machines
US7761737B2 (en) Apparatus, method, and computer product for executing program
Xu et al. Steady rollback and recovery policy based on integrity measurement

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171010

RJ01 Rejection of invention patent application after publication