CN113885948B - Management method and device for windows mirror image layering - Google Patents

Management method and device for windows mirror image layering Download PDF

Info

Publication number
CN113885948B
CN113885948B CN202111152092.1A CN202111152092A CN113885948B CN 113885948 B CN113885948 B CN 113885948B CN 202111152092 A CN202111152092 A CN 202111152092A CN 113885948 B CN113885948 B CN 113885948B
Authority
CN
China
Prior art keywords
disk file
data disk
protection space
tag information
layered protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111152092.1A
Other languages
Chinese (zh)
Other versions
CN113885948A (en
Inventor
曾丽星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Os Easy Cloud Computing Co ltd
Original Assignee
Wuhan Os Easy Cloud Computing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Os Easy Cloud Computing Co ltd filed Critical Wuhan Os Easy Cloud Computing Co ltd
Priority to CN202111152092.1A priority Critical patent/CN113885948B/en
Publication of CN113885948A publication Critical patent/CN113885948A/en
Application granted granted Critical
Publication of CN113885948B publication Critical patent/CN113885948B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/061Improving I/O performance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0643Management of files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0674Disk device
    • G06F3/0676Magnetic disk device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

The invention provides a management method and a device for windows mirror image layering, wherein the method comprises the following steps: the layered protection space is not empty; the same operation is carried out on the registry key value in the operating system and the registry key value in the layered protection space; writing the system data disk file in the operating system and the system data disk file in the layered protection space according to the first tag information; writing the user data disk file in the layered protection space according to the second label information; reading data on the user data disk file corresponding to the layered protection space according to the updated second tag information, and returning the read data to the operating system; after the operation system is updated, the registry key values in the layered protection space are merged into the updated operation system, and the system data disk files in the layered protection space are synchronized into the updated operation system. By the method and the device, the software and personalized configuration which are installed by the user are effectively reserved.

Description

Management method and device for windows mirror image layering
Technical Field
The invention relates to the technical field of desktop clouds, in particular to a management method and device for windows mirror image layering.
Background
Mirror image management is one of the key components necessary for all the virtualized/cloud platform systems, and is used for providing a pre-installed operating system and application software for the virtual machine system, so that the virtual machine/cloud platform system can conveniently and quickly create a virtual machine for a user to use. The desktop cloud system can create user desktops in batches and update desktop data, but after the desktop data are updated in batches, software and personalized configurations installed by users cannot be effectively reserved.
In the related art, by performing hierarchical management on the operating system data and the user software data, that is, redirecting modification of the user software data to an independent hierarchical protection space, after updating the operating system data, the user software data is not damaged, that is, redirecting a user registry key value and a file operation access position to the independently allocated hierarchical protection space, so that the user software data can be saved to the hierarchical protection space. However, after the registry key is redirected, when software and the operating system trigger enumeration operation, the registry key filtering driver needs to perform enumeration operation twice and perform de-duplication and then return to the operating system, so that the system performance is greatly reduced. The file redirection function takes effect after the file filtering driving module is started, and the method has limitation on some files which need to be loaded into the system memory before the file filtering driving module is loaded, so that the mirror image layering effect cannot be achieved.
Disclosure of Invention
The invention mainly aims to provide a management method and device for windows mirror image layering, and aims to solve the problem that software and personalized configuration installed by a user cannot be effectively reserved when a system is updated.
In a first aspect, the present invention provides a method for managing windows mirror image layering, including the following steps:
when a request for reading, writing, renaming, moving or deleting a registry key value in an operating system is obtained, the same operation is carried out on the registry key value in the operating system and the registry key value in the layered protection space, wherein the registry key value in the operating system is the same as the registry key value in the layered protection space;
after a write operation request for the system data disk file is acquired, copying the system data disk file in an operating system into a layered protection space, generating first tag information according to the write operation request, and performing write operation on the system data disk file in the operating system and the system data disk file in the layered protection space according to the first tag information, wherein the first tag information comprises a system data disk file path, a type, an attribute and the write operation request;
copying the user data disk file in the operating system into a layered protection space after a write operation request is acquired, generating second tag information according to the write operation request, and performing write operation on the user data disk file in the layered protection space according to the second tag information, wherein the second tag information comprises a user data disk file path, a type, an attribute and the write operation request;
when a read operation request is obtained for a user data disk file, recording an operation behavior request, updating second tag information, sending the read operation request to a layered protection space according to the updated second tag information, reading data on the user data disk file corresponding to the layered protection space, and returning the read data to an operating system, wherein the user data disk file corresponding to the layered protection space is not empty;
after the operation system is updated, the registry key values in the layered protection space are merged into the updated operation system, and the system data disk files in the layered protection space are synchronized into the updated operation system.
Optionally, the operations include read, write, rename, enumeration, attribute/rights settings, move or delete operations.
Optionally, after obtaining a request for renaming, setting attribute/authority, moving or deleting operation on the system data disk file, recording an operation behavior request, updating first label information, detecting whether the disk file in the layered protection space is empty, if so, operating only the system data disk file in the operating system according to the updated first label information, and if not, performing the same operation on the system data disk file in the layered protection space according to the first label information;
when an enumeration operation request is obtained for the system data disk file, respectively performing enumeration operation for the system data disk file in the operating system and the system data disk file in the layered protection space, merging enumeration results, de-duplication and returning to the user, wherein the system data disk file in the layered protection space is not empty.
Optionally, after obtaining a request for renaming, setting attribute/authority, moving or deleting the user data disk file, recording an operation behavior request, updating second label information, detecting whether the user data disk file in the layered protection space is empty, if so, operating only the user data disk file in the operating system according to the updated second label information, and if not, performing the same operation on the user data disk file in the layered protection space according to the updated second label information.
Optionally, after a read operation request is obtained for the system data disk file, the operation behavior request is recorded, the first tag information is updated, and the data in the system data disk file is read according to the updated first tag information.
In a second aspect, the present invention further provides a device for managing a windows mirror image hierarchy, where the device for managing a windows mirror image hierarchy includes:
the first synchronization module: the method comprises the steps that after a request for reading, writing, renaming, moving or deleting registry key values in an operating system is obtained, the same operation is carried out on the registry key values in the operating system and registry key values in a layered protection space, wherein the registry key values in the operating system are the same as the registry key values in the layered protection space;
and a second synchronization module: the method comprises the steps that after a write operation request for a system data disk file is obtained, the system data disk file in an operating system is copied into a layered protection space, first tag information is generated according to the write operation request, write operations are carried out on the system data disk file in the operating system and the system data disk file in the layered protection space according to the first tag information, wherein the first tag information comprises a system data disk file path, a type, an attribute and the write operation request;
a first execution module: the method comprises the steps that after a write operation request for a user data disk file is obtained, the user data disk file in an operating system is copied into a layered protection space, second tag information is generated according to the write operation request, and the write operation is performed on the user data disk file in the layered protection space according to the second tag information, wherein the second tag information comprises a user data disk file path, a type, an attribute and the write operation request;
and a second execution module: the method comprises the steps of recording an operation behavior request after a read operation request is obtained for a user data disk file, updating second tag information, sending the read operation request to a layered protection space according to the updated second tag information, reading data on the user data disk file corresponding to the layered protection space, and returning the read data to an operating system, wherein the user data disk file corresponding to the layered protection space is not empty;
and a data recovery module: and after the operation system is updated, merging the registry key values in the layered protection space into the updated operation system, and synchronizing the system data disk files in the layered protection space into the updated operation system.
Optionally, the operations include read, write, rename, enumeration, attribute/rights settings, move or delete operations.
Optionally, after obtaining a request for renaming, setting attribute/authority, moving or deleting operation on the system data disk file, recording an operation behavior request, updating first label information, detecting whether the disk file in the layered protection space is empty, if so, operating only the system data disk file in the operating system according to the updated first label information, and if not, performing the same operation on the system data disk file in the layered protection space according to the first label information;
when an enumeration operation request is obtained for the system data disk file, respectively performing enumeration operation for the system data disk file in the operating system and the system data disk file in the layered protection space, merging enumeration results, de-duplication and returning to the user, wherein the system data disk file in the layered protection space is not empty.
Optionally, after obtaining a request for renaming, setting attribute/authority, moving or deleting the user data disk file, recording an operation behavior request, updating second label information, detecting whether the user data disk file in the layered protection space is empty, if so, operating only the user data disk file in the operating system according to the updated second label information, and if not, performing the same operation on the user data disk file in the layered protection space according to the updated second label information.
Optionally, after a read operation request is obtained for the system data disk file, the operation behavior request is recorded, the first tag information is updated, and the data in the system data disk file is read according to the updated first tag information.
In the invention, after obtaining the operation request of reading, writing, renaming, moving or deleting the registry key value in the operating system, the same operation is carried out on the registry key value in the operating system and the registry key value in the layered protection space, wherein the registry key value in the operating system is the same as the registry key value in the layered protection space; after a write operation request for the system data disk file is acquired, copying the system data disk file in an operating system into a layered protection space, generating first tag information according to the write operation request, and performing write operation on the system data disk file in the operating system and the system data disk file in the layered protection space according to the first tag information, wherein the first tag information comprises a system data disk file path, a type, an attribute and the write operation request; copying the user data disk file in the operating system into a layered protection space after a write operation request is acquired, generating second tag information according to the write operation request, and performing write operation on the user data disk file in the layered protection space according to the second tag information, wherein the second tag information comprises a user data disk file path, a type, an attribute and the write operation request; when a read operation request is obtained for a user data disk file, recording an operation behavior request, updating second tag information, sending the read operation request to a layered protection space according to the updated second tag information, reading data on the user data disk file corresponding to the layered protection space, and returning the read data to an operating system, wherein the user data disk file corresponding to the layered protection space is not empty; after the operation system is updated, the registry key values in the layered protection space are merged into the updated operation system, and the system data disk files in the layered protection space are synchronized into the updated operation system. According to the invention, the registry key value data is subjected to synchronous modification operation when the system is operated, the problem of poor enumeration operation performance caused by redirecting the registry key value is solved, when the system data disk file is subjected to write operation, the operation system and the layered protection space are both adopted, and when the user data disk file is subjected to write operation, the mode of only carrying out write operation on the file in the layered protection space is adopted, so that the compatibility of software is greatly improved, the limitation of a file redirecting function is avoided, and after the operation system is updated, the normal operation of all user software is ensured by automatically executing one-time data reverse synchronization operation, so that the software installed by the user and personalized configuration are effectively reserved.
Drawings
FIG. 1 is a flowchart of a first embodiment of a method for managing windows image layering of the present invention;
FIG. 2 is a schematic functional block diagram of a management apparatus for windows mirror layering according to a first embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In a first aspect, an embodiment of the present invention provides a method for managing a windows mirror image hierarchy.
In an embodiment, referring to fig. 1, fig. 1 is a flowchart of a first embodiment of a method for managing windows mirror image layering according to the present invention. As shown in FIG. 1, the management method of windows mirror image layering comprises the following steps:
s10: when a request for reading, writing, renaming, moving or deleting a registry key value in an operating system is obtained, the same operation is carried out on the registry key value in the operating system and the registry key value in the layered protection space, wherein the registry key value in the operating system is the same as the registry key value in the layered protection space;
in this embodiment, after obtaining a request for performing operations of reading, writing, renaming, moving or deleting a registry key value in an operating system, detecting whether a corresponding key value in a registry stored in a hierarchical protection space is empty, if not, performing the same operation on the registry key value in the operating system and the registry key value in the hierarchical protection space, and if so, performing only operation on the registry key value in the operating system.
S20: after a write operation request for the system data disk file is acquired, copying the system data disk file in an operating system into a layered protection space, generating first tag information according to the write operation request, and performing write operation on the system data disk file in the operating system and the system data disk file in the layered protection space according to the first tag information, wherein the first tag information comprises a system data disk file path, a type, an attribute and the write operation request;
in this embodiment, the system data disk file refers to a file that needs to be read before the file filtering driving module is started. When a write operation request is obtained for the system data disk file, first label information is generated according to the write operation request, if the system data disk file in the layered protection space is empty, the system data disk file in the operating system is required to be copied into the layered protection space, so that the system data disk file in the layered protection space is identical to the system data disk file of the operating system, then write operation is performed for the system data disk file in the operating system and the system data disk file in the layered protection space according to the first label information, and if the system data disk file in the layered protection space is not empty, write operation is performed for the system data disk file in the operating system and the system data disk file in the layered protection space according to the first label information, wherein the first label information comprises a system data disk file path, a type, an attribute and a request for writing operation for the system data disk file.
S30: copying the user data disk file in the operating system into a layered protection space after a write operation request is acquired, generating second tag information according to the write operation request, and performing write operation on the user data disk file in the layered protection space according to the second tag information, wherein the second tag information comprises a user data disk file path, a type, an attribute and the write operation request;
in this embodiment, the user data disk file refers to a file that is only used after the file filtering driving module is loaded. The system mainly comprises a hardware driving file, a software installation disk file and a personal data file generated by user operation software, wherein the hardware driving file, the software installation disk file and the personal data file are related to a user system, and the software installation disk file comprises chat software, video software, a browser, office software, an input method, music software, graphic image software, system tool software and programming development software. And after a write operation request is obtained for the user data disk file, generating second tag information according to the write operation request, copying the user data disk file in the operating system into the layered protection space if the user data disk file in the layered protection space is empty, so that the user data disk file in the layered protection space is identical to the user data disk file of the operating system, writing the user data disk file in the layered protection space according to the second tag information, and directly writing the user data disk file in the layered protection space according to the second tag information if the user data disk file in the layered protection space is not empty, wherein the second tag information comprises a user data disk file path, a type, an attribute and a request for writing the user data disk file.
S40: when a read operation request is obtained for a user data disk file, recording an operation behavior request, updating second tag information, sending the read operation request to a layered protection space according to the updated second tag information, reading data on the user data disk file corresponding to the layered protection space, and returning the read data to an operating system, wherein the user data disk file corresponding to the layered protection space is not empty;
in this embodiment, after a read operation request is obtained for a user data disk file, the read operation request is recorded, and the second tag information is updated, where the updated second tag information includes a path, a type, an attribute, and a request for performing a read operation for the user data disk file. If the user data disk file in the layered protection space is not empty, sending the read operation request to the layered protection space according to the updated second tag information, reading the data on the user data disk file corresponding to the layered protection space, and returning the read data to the operating system. If the user data disk file in the layered protection space is empty, reading the data on the user data disk file in the operating system, and returning the read data to the operating system.
S50: after the operation system is updated, the registry key values in the layered protection space are merged into the updated operation system, and the system data disk files in the layered protection space are synchronized into the updated operation system.
In this embodiment, after the operation system is updated, the registry key value in the hierarchical protection space and the registry key value in the updated operation system are overlaid and combined, so that the registry key value in the updated operation system is consistent with the registry key value in the operation system before the update. Copying the system data disk file in the layered protection space to the updated operating system, so that the updated operating system is consistent with the system data disk file in the operating system before the updating.
In this embodiment, after obtaining a request for reading, writing, renaming, moving or deleting a registry key value in an operating system, the same operation is performed on the registry key value in the operating system and a registry key value in a hierarchical protection space, where the registry key value in the operating system is the same as the registry key value in the hierarchical protection space; after a write operation request for the system data disk file is acquired, copying the system data disk file in an operating system into a layered protection space, generating first tag information according to the write operation request, and performing write operation on the system data disk file in the operating system and the system data disk file in the layered protection space according to the first tag information, wherein the first tag information comprises a system data disk file path, a type, an attribute and the write operation request; copying the user data disk file in the operating system into a layered protection space after a write operation request is acquired, generating second tag information according to the write operation request, and performing write operation on the user data disk file in the layered protection space according to the second tag information, wherein the second tag information comprises a user data disk file path, a type, an attribute and the write operation request; when a read operation request is obtained for a user data disk file, recording an operation behavior request, updating second tag information, sending the read operation request to a layered protection space according to the updated second tag information, reading data on the user data disk file corresponding to the layered protection space, and returning the read data to an operating system, wherein the user data disk file corresponding to the layered protection space is not empty; after the operation system is updated, the registry key values in the layered protection space are merged into the updated operation system, and the system data disk files in the layered protection space are synchronized into the updated operation system. According to the embodiment, the registry key value data is subjected to synchronous modification operation when the system is operated, the problem of poor enumeration operation performance caused by redirecting the registry key value is solved, when the system data disk file is subjected to write operation, an operating system and a layered protection space are both adopted, when the user data disk file is subjected to write operation, only the files in the layered protection space are adopted to carry out write operation, the compatibility of software is greatly improved, the limitation of a file redirection function is avoided, and after the operating system is updated, the operation system automatically executes data reverse synchronization operation once, so that all user software can normally operate, and the software and personalized configuration installed by a user can be effectively reserved.
Further, in an embodiment, the operations include read, write, rename, enumeration, attribute/rights settings, move, or delete operations.
In this embodiment, the user operations on the registry key, the system data disk file, and the user data disk file include read, write, rename, enumeration, attribute/permission setting, move, or delete operations.
Further, in an embodiment, after obtaining a request for renaming, setting attribute/authority, moving or deleting operation on a system data disk file, recording an operation behavior request, updating first tag information, detecting whether the disk file in the layered protection space is empty, if so, operating only the system data disk file in the operating system according to the updated first tag information, and if not, performing the same operation on the system data disk file in the layered protection space according to the first tag information;
when an enumeration operation request is obtained for the system data disk file, respectively performing enumeration operation for the system data disk file in the operating system and the system data disk file in the layered protection space, merging enumeration results, de-duplication and returning to the user, wherein the system data disk file in the layered protection space is not empty.
In this embodiment, after obtaining a request for renaming, setting an attribute/authority, moving or deleting a system data disk file, after recording an operation behavior request, updating first tag information, where the updated first tag information includes a path, a type, an attribute of the system data disk file, and a request for renaming, setting an attribute/authority, moving or deleting a system data disk file. Detecting whether the disk file in the layered protection space is empty or not, if so, only operating the system data disk file in the operating system according to the updated first tag information, and if not, performing the same operation on the system data disk file in the layered protection space according to the first tag information.
When an enumeration operation request is obtained for the system data disk file, if the system data disk file in the layered protection space is not empty, respectively performing enumeration operation for the system data disk file in the operating system and the system data disk file in the layered protection space, merging and de-duplicating enumeration results, and returning the enumeration results to a user. If the system data disk file in the layered protection space is empty, enumeration operation is carried out on the system data disk file in the operating system, and an enumeration result is returned to the user.
Further, in an embodiment, after obtaining a request for renaming, setting attribute/authority, moving or deleting an operation on a user data disk file, recording an operation behavior request, updating second tag information, detecting whether the user data disk file in the hierarchical protection space is empty, if so, operating only the user data disk file in the operating system according to the updated second tag information, and if not, performing the same operation on the user data disk file in the hierarchical protection space according to the updated second tag information.
In this embodiment, after obtaining a request for renaming, setting an attribute/permission, moving or deleting a user data disk file, the request for operation behavior is recorded, and the second tag information is updated, where the updated second tag information includes a path, a type, an attribute of the user data disk file, and a request for renaming, setting an attribute/permission, moving or deleting the user data disk file. Detecting whether the user data disk file in the layered protection space is empty or not, if so, only operating the user data disk file in the operating system according to the updated second label information, and if not, performing the same operation on the user data disk file in the layered protection space according to the updated second label information.
Further, in an embodiment, after a read operation request is obtained for a system data disk file, the operation behavior request is recorded, the first tag information is updated, and the data in the system data disk file is read according to the updated first tag information.
In this embodiment, after a read operation request is obtained for a system data disk file, an operation behavior request is recorded, first tag information is updated, the updated first tag information includes a path, a type and an attribute of the system data disk file and a request for performing a read operation for the system data disk file, and according to the updated first tag information, the read operation is performed to read data on the system data disk file in the operating system.
In a second aspect, the embodiment of the invention further provides a device for managing windows mirror image layering.
In an embodiment, referring to fig. 2, fig. 2 is a schematic functional block diagram of a first embodiment of a management apparatus for windows mirror layering according to the present invention. As shown in fig. 2, the management device for windows mirror layering includes:
the first synchronization module 10: the method comprises the steps that after a request for reading, writing, renaming, moving or deleting registry key values in an operating system is obtained, the same operation is carried out on the registry key values in the operating system and registry key values in a layered protection space, wherein the registry key values in the operating system are the same as the registry key values in the layered protection space;
the second synchronization module 20: the method comprises the steps that after a write operation request for a system data disk file is obtained, the system data disk file in an operating system is copied into a layered protection space, first tag information is generated according to the write operation request, write operations are carried out on the system data disk file in the operating system and the system data disk file in the layered protection space according to the first tag information, wherein the first tag information comprises a system data disk file path, a type, an attribute and the write operation request;
the first execution module 30: the method comprises the steps that after a write operation request for a user data disk file is obtained, the user data disk file in an operating system is copied into a layered protection space, second tag information is generated according to the write operation request, and the write operation is performed on the user data disk file in the layered protection space according to the second tag information, wherein the second tag information comprises a user data disk file path, a type, an attribute and the write operation request;
the second execution module 40: the method comprises the steps of recording an operation behavior request after a read operation request is obtained for a user data disk file, updating second tag information, sending the read operation request to a layered protection space according to the updated second tag information, reading data on the user data disk file corresponding to the layered protection space, and returning the read data to an operating system, wherein the user data disk file corresponding to the layered protection space is not empty;
the data recovery module 50: and after the operation system is updated, merging the registry key values in the layered protection space into the updated operation system, and synchronizing the system data disk files in the layered protection space into the updated operation system.
Further, in an embodiment, the operations include read, write, rename, enumeration, attribute/rights settings, move, or delete operations.
Further, in an embodiment, after obtaining a request for renaming, setting attribute/authority, moving or deleting operation on a system data disk file, recording an operation behavior request, updating first tag information, detecting whether the disk file in the layered protection space is empty, if so, operating only the system data disk file in the operating system according to the updated first tag information, and if not, performing the same operation on the system data disk file in the layered protection space according to the first tag information;
when an enumeration operation request is obtained for the system data disk file, respectively performing enumeration operation for the system data disk file in the operating system and the system data disk file in the layered protection space, merging enumeration results, de-duplication and returning to the user, wherein the system data disk file in the layered protection space is not empty.
Further, in an embodiment, after obtaining a request for renaming, setting attribute/authority, moving or deleting an operation on a user data disk file, recording an operation behavior request, updating second tag information, detecting whether the user data disk file in the hierarchical protection space is empty, if so, operating only the user data disk file in the operating system according to the updated second tag information, and if not, performing the same operation on the user data disk file in the hierarchical protection space according to the updated second tag information.
Further, in an embodiment, after a read operation request is obtained for a system data disk file, the operation behavior request is recorded, the first tag information is updated, and the data in the system data disk file is read according to the updated first tag information.
The function implementation of each module in the management device of the windows mirror image layering corresponds to each step in the embodiment of the management method of the windows mirror image layering, and the functions and the implementation process of the function implementation are not repeated here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising several instructions for causing a terminal device to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (10)

1. The management method of the windows mirror image layering is characterized by comprising the following steps:
when a request for reading, writing, renaming, moving or deleting a registry key value in an operating system is obtained, the same operation is carried out on the registry key value in the operating system and the registry key value in the layered protection space, wherein the registry key value in the operating system is the same as the registry key value in the layered protection space;
after a write operation request for the system data disk file is acquired, copying the system data disk file in an operating system into a layered protection space, generating first tag information according to the write operation request, and performing write operation on the system data disk file in the operating system and the system data disk file in the layered protection space according to the first tag information, wherein the first tag information comprises a system data disk file path, a type, an attribute and the write operation request;
copying the user data disk file in the operating system into a layered protection space after a write operation request is acquired, generating second tag information according to the write operation request, and performing write operation on the user data disk file in the layered protection space according to the second tag information, wherein the second tag information comprises a user data disk file path, a type, an attribute and the write operation request;
when a read operation request is obtained for a user data disk file, recording an operation behavior request, updating second tag information, sending the read operation request to a layered protection space according to the updated second tag information, reading data on the user data disk file corresponding to the layered protection space, and returning the read data to an operating system, wherein the user data disk file corresponding to the layered protection space is not empty;
after the operation system is updated, the registry key values in the layered protection space are merged into the updated operation system, and the system data disk files in the layered protection space are synchronized into the updated operation system.
2. The method of managing windows image hierarchy according to claim 1, wherein the operations include read, write, rename, enumeration, attribute/rights setting, move or delete operations.
3. The method for managing windows mirror image layering according to claim 2, wherein after obtaining a request for renaming, attribute/authority setting, moving or deleting operation on a system data disk file, recording an operation behavior request, updating first tag information, detecting whether the disk file in the layering protection space is empty, if so, operating only the system data disk file in the operating system according to the updated first tag information, and if not, performing the same operation on the system data disk file in the layering protection space according to the first tag information;
when an enumeration operation request is obtained for the system data disk file, respectively performing enumeration operation for the system data disk file in the operating system and the system data disk file in the layered protection space, merging enumeration results, de-duplication and returning to the user, wherein the system data disk file in the layered protection space is not empty.
4. The method for managing windows mirror image layering according to claim 2, wherein after obtaining a request for renaming, attribute/authority setting, moving or deleting operation on a user data disk file, recording an operation behavior request, updating second tag information, detecting whether the user data disk file in the layered protection space is empty, if so, operating only the user data disk file in the operating system according to the updated second tag information, and if not, performing the same operation on the user data disk file in the layered protection space according to the updated second tag information.
5. The method for managing windows mirror image layering according to claim 2, wherein after a read operation request is obtained for a system data disk file, the operation request is recorded, the first tag information is updated, and the data in the system data disk file is read according to the updated first tag information.
6. The utility model provides a management device of windows mirror image layering which characterized in that, the management device of windows mirror image layering includes:
the first synchronization module: the method comprises the steps that after a request for reading, writing, renaming, moving or deleting registry key values in an operating system is obtained, the same operation is carried out on the registry key values in the operating system and registry key values in a layered protection space, wherein the registry key values in the operating system are the same as the registry key values in the layered protection space;
and a second synchronization module: the method comprises the steps that after a write operation request for a system data disk file is obtained, the system data disk file in an operating system is copied into a layered protection space, first tag information is generated according to the write operation request, write operations are carried out on the system data disk file in the operating system and the system data disk file in the layered protection space according to the first tag information, wherein the first tag information comprises a system data disk file path, a type, an attribute and the write operation request;
a first execution module: the method comprises the steps that after a write operation request for a user data disk file is obtained, the user data disk file in an operating system is copied into a layered protection space, second tag information is generated according to the write operation request, and the write operation is performed on the user data disk file in the layered protection space according to the second tag information, wherein the second tag information comprises a user data disk file path, a type, an attribute and the write operation request;
and a second execution module: the method comprises the steps of recording an operation behavior request after a read operation request is obtained for a user data disk file, updating second tag information, sending the read operation request to a layered protection space according to the updated second tag information, reading data on the user data disk file corresponding to the layered protection space, and returning the read data to an operating system, wherein the user data disk file corresponding to the layered protection space is not empty;
and a data recovery module: and after the operation system is updated, merging the registry key values in the layered protection space into the updated operation system, and synchronizing the system data disk files in the layered protection space into the updated operation system.
7. The windows mirror layered management apparatus according to claim 6, wherein the operations comprise a read, write, rename, enumeration, attribute/rights setting, move or delete operation.
8. The windows mirror image layered management device according to claim 6, wherein after obtaining a request for renaming, attribute/authority setting, moving or deleting operation on a system data disk file, recording an operation behavior request, updating first tag information, detecting whether the disk file in a layered protection space is empty, if so, operating only the system data disk file in the operating system according to the updated first tag information, and if not, performing the same operation on the system data disk file in the layered protection space according to the first tag information;
when an enumeration operation request is obtained for the system data disk file, respectively performing enumeration operation for the system data disk file in the operating system and the system data disk file in the layered protection space, merging enumeration results, de-duplication and returning to the user, wherein the system data disk file in the layered protection space is not empty.
9. The windows mirror layered management device according to claim 6, wherein after obtaining a request for renaming, attribute/authority setting, moving or deleting an operation on a user data disk file, recording an operation behavior request, updating second tag information, detecting whether the user data disk file in the layered protection space is empty, if so, operating only the user data disk file in the operating system according to the updated second tag information, and if not, performing the same operation on the user data disk file in the layered protection space according to the updated second tag information.
10. The device for managing windows mirror image layering according to claim 6, wherein after obtaining a read operation request for the system data disk file, the operation request is recorded, the first tag information is updated, and the data in the system data disk file is read according to the updated first tag information.
CN202111152092.1A 2021-09-29 2021-09-29 Management method and device for windows mirror image layering Active CN113885948B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111152092.1A CN113885948B (en) 2021-09-29 2021-09-29 Management method and device for windows mirror image layering

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111152092.1A CN113885948B (en) 2021-09-29 2021-09-29 Management method and device for windows mirror image layering

Publications (2)

Publication Number Publication Date
CN113885948A CN113885948A (en) 2022-01-04
CN113885948B true CN113885948B (en) 2023-05-30

Family

ID=79008140

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111152092.1A Active CN113885948B (en) 2021-09-29 2021-09-29 Management method and device for windows mirror image layering

Country Status (1)

Country Link
CN (1) CN113885948B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114510278A (en) * 2022-01-21 2022-05-17 武汉噢易云计算股份有限公司 Data static recovery method, device and equipment and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5931935A (en) * 1997-04-15 1999-08-03 Microsoft Corporation File system primitive allowing reprocessing of I/O requests by multiple drivers in a layered driver I/O system
CN104298472A (en) * 2014-10-12 2015-01-21 张维加 Layered computing virtualization implementing method and device
CN106227577A (en) * 2016-07-08 2016-12-14 贵州天霆云计算科技有限公司 A kind of application data that can be used for virtual desktop and configuration data separating storage method
CN110100228A (en) * 2017-01-06 2019-08-06 甲骨文国际公司 Utilize the efficient delta backup and recovery of the file system hierarchy structure of cloud object storage
CN110928639A (en) * 2019-10-22 2020-03-27 西安雷风电子科技有限公司 Windows virtualization mirror image hierarchical management method and device
CN113209633A (en) * 2021-06-09 2021-08-06 腾讯科技(深圳)有限公司 Mirror image processing method and device, electronic equipment and readable storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7539828B2 (en) * 2000-08-08 2009-05-26 Faronics Corporation Method and system for automatically preserving persistent storage
US8924954B2 (en) * 2011-11-22 2014-12-30 Huawei Technologies Co., Ltd. Application software installation method and application software installation apparatus
WO2016134380A1 (en) * 2015-02-20 2016-08-25 Pristine Machine, LLC Method to split data operational function among system layers
US9852077B2 (en) * 2015-05-21 2017-12-26 Dell Products L.P. Preserving user changes to a shared layered resource

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5931935A (en) * 1997-04-15 1999-08-03 Microsoft Corporation File system primitive allowing reprocessing of I/O requests by multiple drivers in a layered driver I/O system
CN104298472A (en) * 2014-10-12 2015-01-21 张维加 Layered computing virtualization implementing method and device
CN106227577A (en) * 2016-07-08 2016-12-14 贵州天霆云计算科技有限公司 A kind of application data that can be used for virtual desktop and configuration data separating storage method
CN110100228A (en) * 2017-01-06 2019-08-06 甲骨文国际公司 Utilize the efficient delta backup and recovery of the file system hierarchy structure of cloud object storage
CN110928639A (en) * 2019-10-22 2020-03-27 西安雷风电子科技有限公司 Windows virtualization mirror image hierarchical management method and device
CN113209633A (en) * 2021-06-09 2021-08-06 腾讯科技(深圳)有限公司 Mirror image processing method and device, electronic equipment and readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于写过滤技术的多层磁盘保护系统;郑荣;;电子技术与软件工程(19);第233-234页 *
基于应用程序分层技术的镜像管理机制研究;李毅伦;宋虹;王大成;王建新;;计算机应用与软件(02);第29-36页 *

Also Published As

Publication number Publication date
CN113885948A (en) 2022-01-04

Similar Documents

Publication Publication Date Title
EP2780796B1 (en) Method of and system for merging, storing and retrieving incremental backup data
JP4512638B2 (en) Computer hard disk system data protection apparatus and method using system area information table and mapping table
US20120084272A1 (en) File system support for inert files
EP3769224B1 (en) Configurable recovery states
WO2015013348A1 (en) Virtual synchronization with on-demand data delivery
JPWO2002056179A1 (en) Method for regenerating partition using virtual drive, data processing device, and data storage device
CN106357703B (en) Cluster switching method and device
CN100447765C (en) Mapping method for mobile memory device
JP4516598B2 (en) How to control document copying
CN113885948B (en) Management method and device for windows mirror image layering
CN110837441A (en) KVM virtual machine backup method based on dirty data bitmap and network block equipment
JP2008501183A (en) Computer hard disk system data protection apparatus and method for non-preemptively managing system change data in system area
TWI428744B (en) System, method and computer program product for storing transient state information
CN106502830B (en) A kind of method for restoring system backup based on Btrfs file system
US20020129043A1 (en) Program management method for computer to which storage medium is attached, computer and storage medium
US7801858B2 (en) File system and file information processing method
CN112231288A (en) Log storage method and device and medium
EP3769225B1 (en) Free space pass-through
JP4159506B2 (en) Hierarchical storage device, recovery method thereof, and recovery program
US11269739B2 (en) Method and system for managing backup data
KR101826176B1 (en) Backup data control method using snapshot image table
CN110837442B (en) KVM virtual machine backup system based on dirty data bitmap and network block equipment
CN110928639B (en) Windows virtualization mirror image hierarchical management method and device
JP2009163334A (en) Information processor, program, and backup method
CN112269985B (en) Snapshot management method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant