The invention relates to computer systems and more specifically to checkpointing of computer systems.
Most faults encountered in a computer system are transient or intermittent in nature, exhibiting themselves as momentary glitches. However, since transient and intermittent faults can, like permanent faults, corrupt data that is being manipulated at the time of the fault, it is necessary to record periodically a recent state of the computer system to which the computer system can be restored following the fault. Such periodic a recordation of recent computer states is termed “checkpointing”.
By enabling a computer system to revert to a known state following a system fault, checkpointing makes such a system fault tolerant. In a fault tolerant system, checkpointing involves periodically recording the state of the computer system, in its entirety, at time intervals designated as checkpoints. If a fault is detected at the computer system, recovery may then be had by diagnosing and circumventing a malfunctioning unit, returning the state of the computer system to the last checkpointed state before the fault occurred, and resuming normal operations from that state.
Advantageously, if the state of the computer system is checkpointed several times each second, the computer system may be recovered (or rolled back) to its last checkpointed state in a fashion that is generally transparent to a user. Moreover, if the recovery process is handled properly, all applications can be resumed from their last checkpointed state with no loss of continuity and no contamination of data.
However, checkpointing the state of modern computer systems is computationally intensive and time consuming. Therefore, it is advantageous to not save the state of any device that either has no state or which has state that need not be saved. For example, although it is imperative to save the state of the processor in order to resume calculations after recovering from a fault, it is not necessary to save the state of the mouse or keyboard. This is because such devices need only be reset or set to a known state in order to continue operation of the system after system recovery. That is, the mouse cursor position or last button pressed is irrelevant for the continued operation of the system and need not be saved.
The present invention addresses a way of restoring devices to a known state when their state need not be retained.
The invention relates to a method and a system for recovering a computing system's hardware state. In one embodiment the method includes simulating a removal of a hardware device from a bus of the computing system, simulating the replacement of the hardware device onto the bus and executing a configuration program for the computing system. In another embodiment the removal of the hardware device from the bus is simulated following a detection of a fault at the computing system. In yet another embodiment the simulating of the removal of the hardware device from the bus includes clearing bits in a command register of the hardware device. In another embodiment the simulating of the removal of the hardware device from the bus includes modifying a list of hardware devices connected to the bus by removing the hardware device from the list.
In one embodiment upon the execution of the configuration program, the configuration program deems the hardware device removed from the bus. In another embodiment the hardware device is deemed removed from the bus based upon a comparison between the modified list of hardware devices connected to the bus and a master list.
In another embodiment the simulating of the addition of the hardware device to the bus comprises re-initializing the hardware device. In yet another embodiment, re-initializing the hardware device comprises re-setting bits in a command register of the hardware device.
In one embodiment a system for recovering a computing system's hardware state includes a plurality of hardware devices connected to a bus of the computing system, a recovery program configured to simulate a removal of a hardware device from the bus and a configuration program configured to determine, upon simulation of the removal of the hardware device from the bus, that the hardware device has been removed from the bus. In another embodiment the recovery program is further configured to simulate the removal of the hardware device from the bus following a detection of a fault at the computing system. In yet another embodiment the recovery program, in simulating the removal of the hardware device from the bus, is configured to clear bits in a command register of the first hardware device.
In yet another embodiment the system further includes a filter configured to modify a list of hardware devices connected to the bus. In still yet another embodiment the recovery program, in simulating the removal of the hardware device from the bus, is configured to instruct the filter to modify the list of hardware devices connected to the bus by removing the hardware device from the list. In another embodiment the configuration program deems the hardware device removed from the bus based upon a comparison between the modified list of hardware devices connected to the bus and a master list.
The foregoing and other objects, aspects, features, and advantages of the invention will become more apparent and may be better understood by referring to the following description taken in conjunction with the accompanying drawings, in which:
In brief overview and referring to
For example, referring to
Referring again to
However, referring also to
Once this is complete, the configuration manager 40 is instructed to perform a second scan of the system (Step 70). In this case, the checkpoint intercept driver 50 leaves the returned list of devices unchanged (Step 80). This causes the configuration manager 40 to reload the drivers for the non-essential devices (Step 90). The PCI command registers are not modified in this second pass because they are set as part of the normal process of bringing a new device on line.
The foregoing description has been limited to a few specific embodiments of the invention. It will be apparent, however, that variations and modifications can be made to the invention, with the attainment of some or all of the advantages of the invention. It is therefore the intent of the inventor to be limited only by the scope of the appended claims.