Restoring an application from a system dump file
First Claim
Patent Images
1. A method for restoring an application from a kernel dump file, the method comprising:
- identifying an application that was running at a time of a system crash;
receiving a kernel dump file that was created responsive to the system crash;
determining a restoration dataset stored in the kernel dump file;
determining a next data to be processed, wherein the next data is directly after a last data that had been processed by the application prior to the system crash; and
restoring the application based, at least in part, on the restoration dataset, wherein the restoring includes running the application beginning with processing the next data;
wherein;
at least the receiving, determining, and restoring steps are performed by computer software running on computer hardware, wherein the application is restored to the state it was in at the time of the system crash, and wherein the restoring is done without the need for check-pointing.
1 Assignment
0 Petitions
Accused Products
Abstract
An application is identified that was running at a time of a system crash. A system dump file is received that was created responsive to the system crash. A restoration dataset stored in the system dump file is determined. The application is restored based, at least in part, on the restoration dataset.
-
Citations
6 Claims
-
1. A method for restoring an application from a kernel dump file, the method comprising:
-
identifying an application that was running at a time of a system crash; receiving a kernel dump file that was created responsive to the system crash; determining a restoration dataset stored in the kernel dump file; determining a next data to be processed, wherein the next data is directly after a last data that had been processed by the application prior to the system crash; and restoring the application based, at least in part, on the restoration dataset, wherein the restoring includes running the application beginning with processing the next data; wherein; at least the receiving, determining, and restoring steps are performed by computer software running on computer hardware, wherein the application is restored to the state it was in at the time of the system crash, and wherein the restoring is done without the need for check-pointing. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification