CN100489768C - Method and device for booting computer system - Google Patents

Method and device for booting computer system Download PDF

Info

Publication number
CN100489768C
CN100489768C CNB2004800433515A CN200480043351A CN100489768C CN 100489768 C CN100489768 C CN 100489768C CN B2004800433515 A CNB2004800433515 A CN B2004800433515A CN 200480043351 A CN200480043351 A CN 200480043351A CN 100489768 C CN100489768 C CN 100489768C
Authority
CN
China
Prior art keywords
memory
memory mapping
storer
overprogram
volatile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004800433515A
Other languages
Chinese (zh)
Other versions
CN1997961A (en
Inventor
丹尼尔·詹姆士·奥康纳尔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
T1 TECHNOLOGIES Ltd
Original Assignee
T1 TECHNOLOGIES Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by T1 TECHNOLOGIES Ltd filed Critical T1 TECHNOLOGIES Ltd
Publication of CN1997961A publication Critical patent/CN1997961A/en
Application granted granted Critical
Publication of CN100489768C publication Critical patent/CN100489768C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping

Abstract

A method for quickly booting a personal computer system using a non-volatile reprogrammable memory device. A compressed memory image of the contents of the system working memory, hardware configuration and other information stored in memory when the system is in a desired operational state is stored in the non-volatile reprogrammable memory. When rebooting the process detects changed hardware and diverts from the reboot to identify the hardware before continuing.

Description

The method and apparatus that is used for booting computer system
Technical field
The present invention relates to booting computer system or other digital processing device, particularly comprise the personal computer and the desktop computer systems of mobile computing device.
Background technology
Self cooling or hard guiding, personal computer usually first program of operation is the one group of instruction of ROM (read-only memory) (ROM) or electricallyerasable ROM (EEROM) (EEPROM) of packing into, and it comprises initialization system hardware and makes machine can activate hard disk drive to find the needed information of Boot loader (boot-straploader).
Therefore, at present, operating system with guidance information and file pack into working storage or system storage, is commonly referred to random-access memory (ram) from local hard drive.This information generally includes file system driving, operating system nucleus, will analyze configuration and facility information and general outward appearance customization into useful information.
Because a large amount of numbers and the size of these files, computing machine guides with the time of a few minutes usually, promptly reaches spendable state, and it is very dejected that the terminal user often feels for this reason.
The time that is used for vectoring computer can produce significant impact to worker's throughput rate.Personal computer is widely used in the workplace, particularly office environment.In big office, be used to wait for that the computer-directed time can cause a large amount of no output time.If personnel are just using movably personal computer, it was all brought in the meeting on whole working day, and problem is just extended so.And, the mistake of the operating system that causes easily owing to the use of computing machine, and vectoring computer is unrare again.
In addition, in some environment, the continuous functional of computer system or other digital processing device is very important, as the control of production run or communication system.Therefore, must remain to minimum value the stop time that causes by the system failure or " collapse ".
The ACPI standard reduces boot time, even but the system that has used this standard also requires the user to wait at least 30 seconds usually before they can use a computer.
For reaching this purpose, knownly " reflection (imagc) " of the computer memory that has guided is provided and this is stored in hard disk or the storer, as in US 6446203.This patent standard also requires operating system by the zone of abundant guiding will read on the identification dish, and it is not for reflection provides safety practice, promptly is not used in any regulation that changes reflection, also without any the storage that relates to except that working storage.
U. S. application 2002/0078338 is stored the guiding reflection in supplementary storage, and if guiding in being detected from then on, yet its variation that does not have security and can not detect configuration.
U. S. application 2002/0039612 provides the reflection of the guiding in the storer when power-off, but is not used in the regulation of reflection safety practice, looks also not require than the more storage of working storage.
U. S. application 20002/0169950 provides the guiding reflection of the compression of the guiding reflection of initial boot process and center section, the copyright inspection about the initial guide reflection also is provided, but does not have other tangible security or hardware check.
WO 01/13221 uses ROM to store the guiding reflection, comprises that user program does not have tangible security, though it has stored the OS of compression really on dish.
United States Patent (USP) 71673417 provides state storage with compression in the guiding of hard disk reflection, but the change of configuration is upgraded.It does not have tangible security or hardware check.
Therefore, the computing machine of the reflection of guiding has another problem when powering up for storage, and in computing machine, the dangerous version of the Computer Storage data of guiding is held, and it can be included in the data that other place keeps safely.Therefore, this will allow the taking-up of memory mapping to become to get around a kind of mode of any safety practice related in normal bootup process.
In addition, might work as the hardware that computing machine turns off on the computer-chronograph has changed.In this case.Perhaps computer Recognition goes out the guiding reflection that hardware has changed and abandoned being used for complete guiding, perhaps fails identification to change and take place and attempt normally to guide.These two processes all will cause guiding phase of prolonging.
The invention target
A target of the present invention provides the method and apparatus that is used for booting computer system, and it will reduce the guiding needed time of existing system, provide safe environment for the data of storing simultaneously in computer memory.
Another target of the present invention provides method, and the method can allow the variation in the configuration of computer system, but can be owing to these variations cause whole abandoning to quick boot.
These targets of the present invention will have some use to the shortcoming that overcomes prior art at least, maybe can provide the selection of usefulness for the public.
Summary of the invention
A kind of method of booting computer system, described computer system has the system working memory that reaches the level that operating system is completely enclosed, described method comprises step: the memory mapping of the desired content of system working memory is provided, but with memory mapping non-volatile overprogram storer of packing into, and need guide in system the time, but from non-volatile overprogram storer with the memory mapping system working memory of packing into, it is characterized in that, when reinstalling memory mapping, load module identification and the incompatible altered hardware in computer system of memory mapping part, and before proceeding the uninfluenced part of memory mapping, this altered hardware is carried out initialization.
Preferably, this method comprises step: but encrypt and compressing ram reflection and will be through encryption and the memory mapping of compressing non-volatile overprogram storer of packing into, and when reinstalling, decompress and decipher compressed memory mapping, so that the memory mapping that decompresses is loaded into working storage.
Preferably, provide the step of the memory mapping of the desired content of system working memory to comprise the step of the memory mapping of content after the guiding that system working memory is provided, CPU content of registers and other chipset device content.
Preferably, provide the step of the memory mapping of the desired content of system working memory to comprise the step that following memory mapping is provided, described memory mapping be computer system nearest close before be stored in the reflection of all data in system working memory and other hardware device register.
Preferably, memory mapping comprise from virtual memory or easily lose page file the page or leaf.
Preferably, it is included in the step that generates memory mapping during the operating system setting up procedure.
Preferably, it comprises the step of updated stored device reflection with the marked change of responding system configuration.
Preferably, step of updating comprises the step of the memory mapping that filing is nearest, known, good.
Preferably, but non-volatile overprogram storer is flash memory (flash memory), and this method comprises that the retouching operation system source code is to support flash file system (flash file system) and/or flash conversion layer (Flash Translation Layer:FTL).
Preferably, it comprises modification firmware (firmware) but or the step of BIOS to guide from non-volatile overprogram storer.
Preferably, require password to guide for firmware from memory mapping.
Preferably, can not provide correct password can delete any and all memory storing reflections.
Preferably, memory mapping is the reflection that comprises that all and user-dependent memory content of having logined and system are provided with.
Selectively, the present invention relates to computer system, it comprises:
Digital processing unit,
The working storage that is used for digital processing unit,
But non-volatile overprogram storer, it comprises the memory mapping of desired content of the other parts of system working memory and storer, but non-volatile overprogram storer can be sent to system working memory with booting computer system with memory mapping, it is characterized by memory mapping and comprises hardware configuration and hardware context (hardwarecontext) information.
Preferably, under the situation of computer hardware configuration for the change to some extent in the memory mapping, those parts of the reflection relevant with altered hardware are not loaded into, and before the remaining part of memory mapping was processed, altered hardware was identified and is initialised.
Preferably, system comprises disc driver or other memory storage device that at least one file of having comprised memory mapping duplicates.
Preferably, memory mapping is the reflection of content after the desired guiding of existing working storage, CPU register, other chipset register and any interim memory storing page or leaf.
Preferably, memory mapping is the reflection that was stored in all data in the working storage before computer system is closed.
Preferably, in the operating system setting up procedure of computer system, generate memory mapping.
Preferably, system comprises the disc driver that duplicates or other memory storage device of at least one " nearest, known, good (the last known good) " that comprised memory mapping.
Preferably, but non-volatile overprogram storer uses flash memory.
Selectively, the present invention relates to the method for the system of shutting down computer, described computer system comprises system working memory, and the step that described method comprises is:
The memory mapping of the content of the page file storer of generation system working storage, hardware configuration and association, CPU register, chipset register and volatibility,
But with the compression form with memory mapping pack into non-volatile overprogram storer and
System shuts down computer.
Preferably, memory mapping is encrypted in addition.
Selectively, the present invention relates to a kind of method that is used for booting computer system, described computer system has at least one CPU (central processing unit), the operating system that can pack into, and system working memory, described system working memory is configured to admit the operating system of work to reach the level that described operating system of packing into is completely enclosed, the step that described method comprises is: the memory mapping of the desired content of described system working memory is provided, but described memory mapping is stored in non-volatile overprogram storer, with when described computer system is required to guide, utilize load module with described memory mapping from but described non-volatile overprogram storer is packed described system working memory into, described load module during described packing into
(i) be identified in the incompatible variation of in the described computer system and part described memory mapping hardware, the described part of described memory mapping is relevant with the hardware that has changed,
(ii) carry out the initialization of the described hardware that has changed, and
(iii) continue to pack into the remaining unaffected part of described memory mapping is to be directed to exercisable state with described computer system.
Selectively, the present invention relates to a kind of computer system, it comprises:
CPU (central processing unit),
The system working memory that is used for described CPU (central processing unit),
But non-volatile overprogram storer, it comprises the memory mapping of the desired content of described at least system working memory, wherein said memory mapping comprises system hardware configuration and system hardware related information, and wherein said memory mapping is sent to described system working memory so that guide described computer system, and load module is configured to when system bootstrap:
(i) but described memory mapping is sent to described system working memory from described non-volatile overprogram storer,
(ii) described be sent to described system working memory during, be identified in the incompatible variation of in the described computer system and part described memory mapping hardware, the described part of described memory mapping is relevant with the hardware that has changed, so that do not pack described part into
(iii) carry out the initialization of the described hardware that has changed,
The remaining part of described memory mapping (iv) pack into to guide described computer system to exercisable state.
Selectively, the present invention relates to a kind of method of booting computer system, described computer system has the operating system that can pack into and is configured to admit the system working memory of the operating system of work, said method comprising the steps of: but with memory mapping from non-volatile overprogram storer is packed described system working memory into, but described memory mapping has been stored in described non-volatile overprogram storer before described packing into, the described memory mapping of wherein being stored comprises the content of the described system working memory that has comprised the operation system, and wherein during packing into:
(i) identification altered item of hardware since described memory mapping is stored,
(ii) determine the part with the incompatible described memory mapping of described altered item of hardware, so that be not loaded into,
The (iii) described altered item of hardware of initialization, and
(iv) pack into remainder with the described memory mapping of described altered item of hardware compatibility.
Selectively, the present invention relates to a kind of closing and reboot computer method repeatedly, described method comprises:
A kind of computing machine is provided, described computing machine has at least one central processing unit CPU, the operating system that is loaded into, but system working memory and non-volatile overprogram storer, but in described non-volatile overprogram storer, preserve institute's memory storing reflection, the described memory mapping of being stored is current at least described system working memory, the hardware configuration of described computing machine, the related information of described computing machine, and the reflection of the content of registers of described central processing unit CPU, when hardware information or association change at least, change the described memory mapping of being stored; Answer turn-off request, close all files of opening and close described computing machine immediately; When reboot, repeatedly utilize the described memory mapping of being stored that described computing machine turns back to system state when cutting out.
Selectively, the present invention relates to a kind ofly have hardware configuration and related information and the computer system of closing that simplification can be provided, it comprises:
Central processing unit CPU with content of registers,
The system working memory that is used for described CPU (central processing unit),
But non-volatile overprogram storer,
But be stored in described non-volatile overprogram storer, the memory mapping of the desired content of described at least system working memory, described memory mapping was created before closing and is enough to described computing machine is re-directed to duty, described memory mapping is included in last-minute plea and closes the current at least described system working memory of preserving before, the hardware configuration of described computing machine, the related information of described computing machine, and the reflection of the content of registers of described central processing unit CPU, described reflection is changed to comprise any variation in the hardware configuration.
Selectively, the present invention relates to a kind of closing and reboot computer method repeatedly, described method comprises:
But provide have at least one central processing unit CPU, the computing machine of the operating system of packing into, system working memory and non-volatile overprogram storer, but in described non-volatile overprogram storer, preserve the reflection of being stored, the described reflection of being stored is the reflection of the content of registers of the related information of current at least described system working memory, the hardware configuration of described computing machine, described computing machine and described central processing unit CPU, changes the described reflection of being stored when hardware information or related variation at least; Answer turn-off request, close all files of opening and close described computing machine immediately; When reboot, repeatedly utilize the described reflection stored described computing machine to turn back to system state when cutting out to use load module, during the described reflection of storing packing into, described load module
(i) be identified in the incompatible variation of part in the described computing machine with the described reflection of being stored hardware, the described part of the described reflection of being stored is relevant with the hardware that has changed,
(ii) carry out the initialization of the described hardware that has changed, and
The remaining unaffected part of the described reflection that (iii) continuing packs into is stored is to be directed to exercisable state with described computer system.
Description of drawings
Fig. 1 is used for the computer guiding of the computing machine that operating system drives or the process flow diagram of start-up course according to the present invention;
Fig. 2 is used for the computer guiding of the computing machine that firmware drives or the process flow diagram of start-up course according to the present invention;
Fig. 3 is the process flow diagram according to pass of the present invention closed procedure;
Fig. 4 is the process flow diagram that is used for the pass closed procedure of the computing machine that firmware drives according to the present invention;
Fig. 5 is the diagram of content of the memory mapping file of compression;
Fig. 6 is the process flow diagram of swap operation related in the paging data between different memory or virtual memory cell (paging data);
Fig. 7 is the diagram of data stream in the computing machine.
Embodiment
Example cited below relates to use of the present invention with the guiding personal computer, but relates to the personal computer that has the non-volatile overprogram storer that is configured to influence vectoring computer simultaneously.Yet the present invention also is applicable to other digital processing device, and as computer game machine, business machine and telecommunication apparatus, described equipment requirements loading of operating system is for using.
With reference to Fig. 1, illustrated according to the present invention to be used for the guiding of computer system or the process flow diagram of start-up course.
Carrying out " cold " or " firmly " guiding with reference to the method supposition that Fig. 1 describes.It will be understood by a person skilled in the art that this method also is applicable to the situation of carrying out " heat " or " soft " guiding.
With reference to Fig. 1, for example in step 1, user's start-up system power switch.This to system applies power supply, and under common mode, firmware software starts homing sequence.Therefore in step 2, start firmware, carry out its common POST (POST) initialization sequence, and do one of two things immediately.Firmware is carried out: a) seek the booting operating system load module at the hard disk drive of system, as betide in the existing homing sequence; Or b) selectively, but the non-volatile overprogram storer that firmware provides in computer system seek.Even originally firmware seeks the booting operating system load module at hard disk drive, but Boot loader is indication mechanism download memory reflection from non-volatile overprogram storer still, further will describe as following, though this password that may be stored in the firmware with user's input is a condition.
But non-volatile overprogram storer provides as integrated circuit, for example provides on the motherboard of personal computer, and it is addressable for computer system.Selectively, it is provided so that existing machine is improved as the PCI additional card.But also can otherwise provide non-volatile overprogram storer,, thereby its content can be visited to realize the value of bootstrap technique of the present invention fully apace by system as long as it satisfies the requirement that can be visited by system.
Therefore go to step 3 now, the booting operating system load module starts bootup process, but itself or direct interior from non-volatile overprogram storer perhaps from the hard disk drive of system.
But non-volatile overprogram storer comprises the memory mapping of RAM content, and when being loaded into system storage, it is enough to and computer system can be offered the user with available state, i.e. booting computer system.
According to user's needs, but in non-volatile overprogram storer, catch and the memory mapping that provides can be adopted various ways.For example, but non-volatile overprogram storer can comprise the memory mapping of guiding back system working memory (being RAM) content.
For example, but another selection is with the memory mapping of the preferred compression of all data among the current RAM of being stored in non-volatile overprogram storer of packing into.In optimal way, the memory mapping of this compression storage is from the previous bolt down procedure that is similar to the State S4 bolt down procedure in the current ACPI 2.0a standard.This has comprised the computing machine and/or the operating system setting of the computer system of the state that is in the preparation of having carried out user's use, and preferably offer the user so that the user restarts the use of system, it is identical or basic identical when wherein, its situation that is in begins to shut down with the user.
The details of the ACPI S4 shutdown of standard can find from current ACPI specification version 2.0, and it can obtain at unified resource positioning address (URL) http://www.acpi.info.
Memory mapping can only be the part reflection of system storage.Therefore, reflection can comprise the data that for example relate to operating system integral body, and the remainder of foundation or the necessary information of setting system working storage can be from the working storage of packing into as another memory storage device of system disk.For example because cost restriction, but under the situation of the size of the non-volatile overprogram storer of needs restriction, this scheme may be more superior, but the present invention remains worth, compares with known bootup process to be still and significantly reduces because carry out needed total time of bootup process.
In the setting up procedure of operating system, can generate memory mapping at first, perhaps when the user carries out great change to computer configuration, can selectively replace it.Equally, when the user started shutdown sequence, memory mapping can be hunted down.These selections will further be discussed with reference to figure 2.
Memory mapping preferably is compressed, thus the memory mapping of having compressed (CMI) but be stored in non-volatile overprogram storer, but and when needs, from non-volatile overprogram storer, retrieve.Compression can be saved a large amount of storage spaces, and does not have significantly to increase the decompression process by the boot time that has reduced provided by the invention.Can use as available compression algorithm in open-source zlib storehouse.
Except compression, memory mapping can also under the situation of maintaining secrecy at the hard disk drive quilt that carries same data, be prevented from the attempt of described storer recovering information by the Standard Encryption the same with hard disk drive.
In Fig. 1, exist in the memory mapping of having determined to compress (under the situation of step 6),, to require the user in the CMI file, to select (step 7), and prompting is with password (step 8) if multidocument (for example being used for multi-user or different operating system) is arranged.If incorrect password (step 9) is provided, can attempt login (step 11) once more, if but prove an abortion (step 12), the memory mapping that the computing machine deletion has been compressed (step 13) and any data in the volatibility page file (the interim storage on the hard disk) and shutdown (step 15).These strick precautions make the quick guidance system of destruction become very difficult.If CMI is deleted, next time the guiding will be normal boot (step 4-5,36-39).
When providing password and its correct, Boot loader is checked in the hardware for any significant change (step 17) in the compressing ram reflection.If no, but it is decompressed to be arranged in the CMI of non-volatile overprogram storer, and computer system setting and all memory contents be from the CMI that the decompresses RAM (step 21) that packs into, thereby all application, service and device drives are provided.
Then, from before the state of storage, operating system is taken over, and removes and easily loses page file (step 23) and check any variation in the hot-pluggable hardware configuration.If it finds any variation, its modified logo is set to FALSE (step 25), makes to make new reflection when shutting down.
Bootup process has just been finished faster now.
If find altered hardware configuration (step 17) when hardware check, Boot loader is removed all ephemeral datas and point (step 30) that processing memory is videoed and need be safeguarded to the change of hardware.Immediately, any altered device drives (step 31) of packing into, and continue the decompression of memory mapping then and pack into, cross inapplicable part (step 32).Like this, as before, OS instantiation (instantiate) and PC guide fully, yet will modified logo be set so that preserve new memory mapping when shutdown.
Because memory content is from but non-volatile overprogram storer is packed RAM soon into, rather than from the system disk search and transmit, the needed time of bootup process has significantly reduced.
Use Microsoft Windows in guiding TMIn the example of the personal computer of operating system (PC), but firmware is at first checked non-volatile overprogram storer for guidance information, and with Windows boot files and kernel load memory.If storage space allows, can generate registration table deposit (registry hive) but and it is stored in non-volatile overprogram storer, perhaps can generate the registration table deposit and it is stored in local hard drive, as the situation of existing system.When Windows is loaded into, but device drives is from non-volatile overprogram storer RAM that packs into.Service and third party start application program will be from local hard drives preload., can physically revise typical personal computer to implement this process by but non-volatile overprogram memory chip of 64,000,000 or the above byte that add to the machine motherboard is provided.The support to flash file system (FFS) and flash conversion layer (FTL) of dress in using, but the firmware on the modification PC is to allow from non-volatile overprogram storer guiding.Microsoft Windows as Windows XP TMCan be modified, support FFS/FTL to drive by internal drive (as FAT16/32, NTFS and FFS/FTL) or third party.Can provide hardware supported by additional product based on PCI.But Windows boot files and device drives are added to non-volatile overprogram storer, and third party's start-up routine physically moves to the initial of hard disk drive.
In another example that uses Windows operating system, but firmware guide from non-volatile overprogram storer, and memory mapping packed into and decompress to RAM.After memory mapping is in RAM, from the initial generation of hard disk drive or the less environmental change of packing into.These include, but is not limited to following content:
Application program is installed
The startup application program of non-critical (non-critical)
The registration table deposit
Page file (virtual memory)
Similar for what mentioned in the physically modifying of the typical personal computer of operation Microsoft Windows operating system and the above-mentioned example, yet the Windows memory mapping of the compression of customization generates in the Windows setting up procedure, but and is stored in non-volatile overprogram storer.The setting that begins to store more customization at hard disk drive.
Fig. 2 has shown the selectable sequence that is used for following computing machine, the firmware that described computing machine uses inspection part to change.This sequence is different with Fig. 1's, only because ZBIOS execution hardware configuration inspection rather than use provide the operating system of inspection.
Now go to Fig. 3, illustrate with chart according to the pass closed procedure of computing machine of the present invention.Process is selected shutdown command with the user and is begun in step 1 from operating system.As the part of closing closed procedure, operating system is checked modified logo in step 3 immediately.Modified logo is a sign that is provided with by operating system when computer configuration is significantly changed.Significant change can comprise (unrestricted) following content:
A) new application program is installed
I) when booting operating system, need the application program of receiving member to install
B) change of laying in for registration table
C) device drives upgrading
D) serviced component (service pack)/hot repair multiple (hotfix) is installed
E) service is revised
F) user environment customization:
(i) desktop
(ii) wallpaper
(iii) theme (themes)
(iv) sound
(v) icon
(vi) color scheme
Therefore, to each new user session phase (session) of bootstrap, modified logo is made as vacation (false).Then, when marked change takes place when, the variation of for example listing as mentioned, sign is made as true (true).Be explanation, the tabulation of marked change provided above is not an exclusiveness.And, some actions are provided in the tabulation that the user can wish to provide from above.
Get back to Fig. 3, shown in step 5, if modified logo is false, shown in step 14, owing in this zone, do not change, the then closeall file of opening of operating system, equipment and service but do not preserve any system configuration data.Immediately, in step 15, operating system continues its normal closed procedure that closes, and closes (Statc S5Shutdown) as the current State S5 that is embodied as in ACPI 2.0a standard.Subsequently, the state that is in of computing machine is self closing or reboot.
Shown in the step 4 among Fig. 3, if modified logo is true, then " nearest, known, good " compressing ram reflection (LKG) files to suitable memory storage, as the local hard drive of system.It betides step 6.
Then, in step 7, be used for CMI nearest guidance system, active state and be used as LKG CMI at this moment.
Immediately, with step 8 beginning, the bolt down procedure that os starting has been revised.
In step 8, generate new key and it is stored among the new CMI.In step 9, current hardware information is written into new file after this, and then in step 10, all data among the current RAM of being stored in are used the proper compression algorithm and are compressed and encrypt and store.Next,, easily lose the paging data subdivision that any paging data (paging data) in the page file are loaded into new CMI file in step 11, then in step 12, the current hardware context of packing into.In step 13, loading procedure is finished immediately, and the definitive document in the non-volatile ram is marked as new active CMI.As described in the top refer step 15, operating system is finished the pass closed procedure of having revised immediately.
Can see from method shown in Figure 3, can be used for the file of memory mapping of compression of guidance system to be retained.In this mode, if the operation that the user has carried out machine is that be harmful to, that be non-expectation, the significant change, if perhaps system crash, the user has the memory mapping of at least one compression all the time, can be by reboot from the memory mapping computing machine of described compression.
Fig. 4 has shown similar shutdown sequence, but this time be the computing machine to firmware control, and wherein, the beginning and the decline of the bolt down procedure of having revised are under the control of firmware.
Fig. 5 has shown the layout of memory mapping (CMI) file of common compression, wherein at first storage key and authorization information, following by hardware configuration information, is the RAM content, from the paging data (or volatibility page or leaf content) of virtual store file then, is the hardware context of current hardware at last.If its configuration has not been changed since closing last time, compression and reinstalling of enciphered message are enough to make computing machine to return complete duty.
Fig. 6 shown three the relevant operations of storage with paging file (volatibility page file or virtual store file), and wherein, it can be stored in the memory mapping of having compressed.System request one page in the time of for the first time (step 1), described page or leaf should in step 2, export to before the RAM in the volatibility page file, and it is retrieved, decompresses and decipher from CMI paging data.In step 3 and 4, if described page or leaf reaches certain time limit in RAM, because must store the page or leaf with higher priority, it can be swapped out to the volatibility page file.Subsequently, shown in step 5 and 6, as in normal operation, system asks memory page once more, and it will be changed to from the volatibility page file.
Now go to Fig. 7, shown basic processing device and memory member according to an example of computer system of the present invention.For those those skilled in the relevant art of the present invention, other device and the communication path that are used for memory devices are possible.There is a CPU (central processing unit) (CPU) 701 in system, wherein is provided with a control module 702.Provide working storage with random access storage device (RAM) 703 forms, but it is non-volatile overprogram storer 704.Data bus 705 allows data under the control of control module 702, by address date control bus 706, and exchange between RAM 703 and CPU 701.Similarly, data bus 707 allows data under the control of control module 702, by address date control bus 708, but exchanges between non-volatile overprogram storer 703 and CPU.Therefore but bus 707 information that allows to comprise among the RAM of all memory contents is sent to non-volatile overprogram storer 704.Bus 705 and 707 can comprise system bus.In addition, the content of RAM 703 can be compressed, and thus, but the reflection that has compressed can be transmitted to be stored in non-volatile overprogram storer 704 by bus 707.Then, when needs, can directly be transferred to RAM 703 or can be compressed earlier and be contained in then among the RAM 703 but be stored in memory mapping in non-volatile overprogram storer 704.
But non-volatile overprogram storer 704 has its advantage, and it is non-volatile solid condition apparatus in essence, therefore when power supply when computer system is removed, but the content of non-volatile overprogram storer is held.Yet, those skilled in the art should understand, but non-volatile overprogram storer of mentioning in the presents comprises the use of flash RAM, but be need be such as the external source of the battery form with non-volatile overprogram storer of keeping memory content for described flash RAM.
But can be provided as integrated circuit on the system board for example, or on discrete plate or card according to non-volatile overprogram memory devices of the present invention.Particularly, if desired, be on the card of SmartMedia or CompactFlash but non-volatile overprogram storer can be provided in as those trade marks that is mentioned.
But some current available non-volatile overprogram memory products have the loading time order of magnitude faster than hard disk drive, therefore can see, provide remarkable advantages comparing with prior art system aspect the boot time according to method and system of the present invention.
The nonvolatile memory of other type and solid-state disk can use or replace flash memory with flash memory, as magnetic ram (MRAM), in two operations of read and write its have than flash memory fast exponential transmission speed.MRAM is expected to produce in enormous quantities in 2005.
Preferably, the memory mapping (CMI) that application program generates compression extraly that is provided with to desired operating system, it comprises the compression reflection of all data among the current RAM of being stored in, as the current State S4 system relationship file that is embodied as in ACPI 2.0a standard.But this file storage is not shut down computer but application program is set in non-volatile overprogram storer, and as the situation of the generation of State S4 system relationship file in the current ACPI 2.0a standard, on the contrary, it allows the bolt down procedure of sequencing.
Preferably, the retouching operation system source code is to pass through flash conversion layer (FTL) internal support flash file system (FFS), as the FTL standard (http://www.intel.com/design/flcomp/applnots/297816.htm) of Intel oneself.
Easily, the memory mapping of compression (CMI) has the compressed version of all data among the current RAM of being stored in that is produced by before bolt down procedure, and is similar with the State S4 bolt down procedure in current ACPI2.0a standard.
In most of preferred implementation, but CMI is before filed to using with the CMI as " nearest, known, good " with non-volatile overprogram storer of installing.
The computer system of mentioning in presents generally includes digital data system.
The description and the claim that run through this instructions, word " comprise (comprise) " and variation does not mean that additive, parts, complete thing or the step of getting rid of other as " comprises " and " comprising ".
Industrial usability
The invention provides a kind of method, described method allows computer fast more a lot of than the standard hard drive guiding The ground guiding even allocation of computer changes to some extent since nearest good guiding, has therefore reduced The waste user time aspect consumption level, the user time of described waste be for etc. to be calculated The machine software of packing into can be carried out the assigned address of useful work thereon on it to the user. In addition, this Bright being provided for carried out aforesaid operations in the mode of safety.

Claims (37)

1. method that is used for booting computer system, described computer system has at least one CPU (central processing unit), the operating system that can pack into, and system working memory, described system working memory is configured to admit the operating system of work to reach the level that described operating system of packing into is completely enclosed, the step that described method comprises is: the memory mapping of the desired content of described system working memory is provided, but described memory mapping is stored in non-volatile overprogram storer, with when described computer system is required to guide, utilize load module with described memory mapping from but described non-volatile overprogram storer is packed described system working memory into, described load module during described packing into
(i) be identified in the incompatible variation of in the described computer system and part described memory mapping hardware, the described part of described memory mapping is relevant with the hardware that has changed,
(ii) carry out the initialization of the described hardware that has changed, and
(iii) continue to pack into the remaining unaffected part of described memory mapping is to be directed to exercisable state with described computer system.
2. the method for claim 1 further comprises the steps:
(i) but before in described memory mapping being stored into described non-volatile overprogram storer, encrypt and compress described memory mapping, and
(ii) but described memory mapping was being packed into before the step of described system working memory from described non-volatile overprogram storer, decompressing and decipher described memory mapping.
3. the method for claim 1 wherein provides the described step of memory mapping of the desired content of described system working memory to comprise: the step of memory mapping that the content of the content of content after the guiding of described system working memory, CPU register and other chipset device is provided.
4. the method for booting computer system as claimed in claim 1, wherein said memory mapping for described computer system nearest close before be stored in the reflection of all data in described system working memory and other hardware device register.
5. the method for booting computer system as claimed in claim 4, wherein said memory mapping comprise the page or leaf from virtual memory or volatibility page file.
6. the method for claim 1, it further is included in the step that generates described memory mapping during the setting up procedure of described operating system of packing into.
7. the method for claim 1, its further be included in variation in the described computer system of identification hardware after, but update stored in the step of the memory mapping in described non-volatile overprogram storer.
8. method as claimed in claim 7, but it further comprises nearest, known, good memory mapping is archived in step in non-volatile overprogram storer.
9. method as claimed in claim 7, wherein when the shutdown of described computer system, but the described memory mapping that is stored in non-volatile overprogram storer is not updated.
10. the method for claim 1 comprises that further the described operating system of packing into of modification is to support the step of flash file system and/or flash conversion layer (FTL) but wherein said non-volatile overprogram storer is flash memory and described method.
11. the method for claim 1 is revised firmware with the step from described non-volatile overprogram storer guiding but it further comprises.
12. method as claimed in claim 11, it further comprises for described firmware requirement password with the step from described memory mapping guiding.
13. method as claimed in claim 12 wherein fails to provide correct password can delete all memory storing reflections.
14. the method for claim 1, wherein said memory mapping are to comprise being provided with user-dependent all systems that logined and the reflection of memory content.
15. a computer system, it comprises:
CPU (central processing unit),
The system working memory that is used for described CPU (central processing unit),
But non-volatile overprogram storer, it comprises the memory mapping of the desired content of described at least system working memory, wherein said memory mapping comprises system hardware configuration and system hardware related information, and wherein said memory mapping is sent to described system working memory so that guide described computer system, and load module is configured to when system bootstrap:
(i) but described memory mapping is sent to described system working memory from described non-volatile overprogram storer,
(ii) described be sent to described system working memory during, be identified in the incompatible variation of in the described computer system and part described memory mapping hardware, the described part of described memory mapping is relevant with the hardware that has changed, so that do not pack described part into
(iii) carry out the initialization of the described hardware that has changed,
The remaining part of described memory mapping (iv) pack into to guide described computer system to exercisable state.
16. computer system as claimed in claim 15, wherein said system comprise disc driver or other memory storage device that at least one file of having comprised described memory mapping duplicates.
17. computer system as claimed in claim 15, wherein said memory mapping are the reflections of content after the desired guiding of register, other chipset register and any interim memory storing page or leaf of existing described system working memory, described CPU (central processing unit).
18. computer system as claimed in claim 15, wherein said memory mapping are the reflections that was stored in all data in the described system working memory before described computer system is closed.
19. computer system as claimed in claim 15, wherein said memory mapping generates in the setting up procedure of the operating system of described computer system.
20. computer system as claimed in claim 15, wherein said system comprise the disc driver that duplicates or other memory storage device of at least one " nearest, known, good " that comprised described memory mapping.
21. computer system as claimed in claim 15, but wherein said non-volatile overprogram storer uses flash memory.
22. the method for a booting computer system, described computer system has the operating system that can pack into and is configured to admit the system working memory of the operating system of work, said method comprising the steps of: but with memory mapping from non-volatile overprogram storer is packed described system working memory into, but described memory mapping has been stored in described non-volatile overprogram storer before described packing into, the described memory mapping of wherein being stored comprises the content of the described system working memory that has comprised the operation system, and wherein during packing into:
(i) identification altered item of hardware since described memory mapping is stored,
(ii) determine the part with the incompatible described memory mapping of described altered item of hardware, so that be not loaded into,
The (iii) described altered item of hardware of initialization, and
(iv) pack into remainder with the described memory mapping of described altered item of hardware compatibility.
23. close and reboot computer method repeatedly for one kind, described method comprises:
A kind of computing machine is provided, described computing machine has at least one central processing unit CPU, the operating system that is loaded into, but system working memory and non-volatile overprogram storer, but in described non-volatile overprogram storer, preserve institute's memory storing reflection, the described memory mapping of being stored is current at least described system working memory, the hardware configuration of described computing machine, the related information of described computing machine, and the reflection of the content of registers of described central processing unit CPU, when hardware information or related information change at least, change the described memory mapping of being stored; Answer turn-off request, close all files of opening and close described computing machine immediately; When reboot, repeatedly utilize the described memory mapping of being stored that described computing machine turns back to system state when cutting out.
24. method as claimed in claim 23 is characterized in that any chipset register all additionally is saved in the described memory mapping of being stored.
25. method as claimed in claim 23, the described memory mapping that it is characterized in that being stored is by the form preservation with compression.
26. method as claimed in claim 23 is characterized in that the described memory mapping of being stored also is included in the content of the volatibility page file storer of current memory storing reflection when being created.
27. method as claimed in claim 23 is characterized in that the described memory mapping of being stored is created first when the guiding first of computing machine.
28. method as claimed in claim 23 is encrypted and described memory mapping that compression is stored and store the described memory mapping of being stored that institute encrypts and compresses in described non-volatile overprogram storer step but it is characterized in that it is included in when closing.
29. method as claimed in claim 23 is characterized in that the step of described preservation comprises that the institute's memory storing reflection that is archived to nearest, known, good institute's memory storing reflection in the suitable memory storage and creates is marked as described step nearest, known, good institute memory storing reflection when shutting down before.
30. method as claimed in claim 23 under the situation that it is characterized in that not needing institute's memory storing reflection is changed when closing, is saved with regard to the variation that does not have system configuration.
31. method as claimed in claim 23, it is characterized in that but described non-volatile overprogram storer is a flash memory, and described method comprises that the described operating system source code of modification is to support the step of flash file system and/or flash conversion layer (FTL).
32. method as claimed in claim 23, it is characterized in that being created, institute's memory storing reflection is to comprise and user-dependent all the system's settings of login and the reflection of memory content.
33. one kind has hardware configuration and related information and the computer system of closing that simplification can be provided, it comprises:
Central processing unit CPU with content of registers,
The system working memory that is used for described CPU (central processing unit),
But non-volatile overprogram storer,
But be stored in described non-volatile overprogram storer, the memory mapping of the desired content of described at least system working memory, described memory mapping was created before closing and is enough to described computing machine is re-directed to duty, described memory mapping is included in last-minute plea and closes the current at least described system working memory of preserving before, the hardware configuration of described computing machine, the related information of described computing machine, and the reflection of the content of registers of described central processing unit CPU, described reflection is changed to comprise any variation in the hardware configuration.
34. computer system as claimed in claim 33 is characterized in that described system comprises disc driver or other memory storage device that at least one file of having comprised described memory mapping duplicates.
35. computer system as claimed in claim 33 is characterized in that described system comprises the disc driver that duplicates or other memory storage device of at least one " nearest, known, good " that comprised described memory mapping.
36. computer system as claimed in claim 33, but it is characterized in that described non-volatile overprogram storer uses flash memory.
37. close and reboot computer method repeatedly for one kind, described method comprises:
But provide have at least one central processing unit CPU, the computing machine of the operating system of packing into, system working memory and non-volatile overprogram storer, but in described non-volatile overprogram storer, preserve the reflection of being stored, the described reflection of being stored changes the described reflection of being stored for the reflection of the content of registers of the related information of current at least described system working memory, the hardware configuration of described computing machine, described computing machine and described central processing unit CPU when hardware information or related information change at least; Answer turn-off request, close all files of opening and close described computing machine immediately; When reboot, repeatedly utilize the described reflection stored described computing machine to turn back to system state when cutting out to use load module, during the described reflection of storing packing into, described load module
(i) be identified in the incompatible variation of part in the described computing machine with the described reflection of being stored hardware, the described part of the described reflection of being stored is relevant with the hardware that has changed,
(ii) carry out the initialization of the described hardware that has changed, and
The remaining unaffected part of the described reflection that (iii) continuing packs into is stored is to be directed to exercisable state with described computer system.
CNB2004800433515A 2004-06-15 2004-06-15 Method and device for booting computer system Expired - Fee Related CN100489768C (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/NZ2004/000122 WO2005124540A1 (en) 2004-06-15 2004-06-15 Method and apparatus for booting a computer system

Publications (2)

Publication Number Publication Date
CN1997961A CN1997961A (en) 2007-07-11
CN100489768C true CN100489768C (en) 2009-05-20

Family

ID=35509886

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004800433515A Expired - Fee Related CN100489768C (en) 2004-06-15 2004-06-15 Method and device for booting computer system

Country Status (5)

Country Link
EP (1) EP1759284A4 (en)
JP (1) JP2008502988A (en)
CN (1) CN100489768C (en)
IL (1) IL179954A0 (en)
WO (1) WO2005124540A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8560760B2 (en) * 2007-01-31 2013-10-15 Microsoft Corporation Extending flash drive lifespan
JP5494134B2 (en) * 2010-03-31 2014-05-14 株式会社リコー Control apparatus and control method
JP5773773B2 (en) * 2011-06-22 2015-09-02 キヤノン株式会社 Image forming apparatus, start control method of image forming apparatus, program, and storage medium
US20150032945A1 (en) * 2012-01-29 2015-01-29 Thomson Licensing Method for flash compressed instruction caching for limited ram/flash device architectures
CN104272250A (en) * 2012-04-30 2015-01-07 惠普发展公司,有限责任合伙企业 Configurable computer memory
KR101987144B1 (en) 2012-10-10 2019-06-11 삼성전자주식회사 Main memory system storing Operating System program and computer system including the same
CN113569277B (en) * 2021-06-25 2024-01-26 北京鼎普科技股份有限公司 Method and device for checking security document data and electronic equipment

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6379120A (en) * 1986-09-22 1988-04-09 Nec Corp Quick start-up system
JP3102455B2 (en) * 1993-07-26 2000-10-23 インターナショナル・ビジネス・マシーンズ・コーポレ−ション Information processing system
US5802365A (en) * 1995-05-05 1998-09-01 Apple Computer, Inc. Dynamic device matching using driver candidate lists
US5710930A (en) * 1995-08-04 1998-01-20 Intel Corporation Apparatus and a method for allowing an operating system of a computer system to persist across a power off and on cycle
US6134616A (en) * 1996-10-28 2000-10-17 International Business Machines Corporation Method and apparatus for dynamic re-enumeration and reconfiguration of computer devices after system hibernation
US6173417B1 (en) * 1998-04-30 2001-01-09 Intel Corporation Initializing and restarting operating systems
US6209088B1 (en) * 1998-09-21 2001-03-27 Microsoft Corporation Computer hibernation implemented by a computer operating system
US6636963B1 (en) * 1999-12-30 2003-10-21 Cardiac Pacemakers, Inc. Quick starting for microprocessor-based system by retrieving a target state memory image and a target state data structure from an image storage medium
JP2004038546A (en) * 2002-07-03 2004-02-05 Fuji Xerox Co Ltd Start control method, start control system, and image processor

Also Published As

Publication number Publication date
WO2005124540A1 (en) 2005-12-29
CN1997961A (en) 2007-07-11
JP2008502988A (en) 2008-01-31
IL179954A0 (en) 2007-05-15
EP1759284A1 (en) 2007-03-07
EP1759284A4 (en) 2007-07-25

Similar Documents

Publication Publication Date Title
US7313684B2 (en) Method and apparatus for booting a computer system
WO2005029325A1 (en) Method and apparatus for booting a computer system
NZ520786A (en) Method of booting a computer system using a memory image of the post boot content of the system RAM memory
EP2005295B1 (en) Direct boot arrangement using a nand flash memory
US20140115316A1 (en) Boot loading of secure operating system from external device
CN1809813B (en) Method for firmware variable storage with eager compression, fail-safe extraction and restart time compression scan
US8086839B2 (en) Authentication for resume boot path
US20080059785A1 (en) Method and apparatus for shutting down a computer system
US20070112899A1 (en) Method and apparatus for fast boot of an operating system
CN102081534A (en) Automated modular and secure boot firmware update
CN105144185A (en) Verifying controller code and system boot code
CN103917949A (en) Component update using management engine
CN102439557A (en) Hybrid storage device
CN105122259A (en) Retrieving system boot code from a non-volatile memory
TW200419447A (en) Decoupled hardware configuration manager
CN100580627C (en) Method and device for starting computer system
US8510501B2 (en) Write-protection system and method thereof
US11436367B2 (en) Pre-operating system environment-based sanitization of storage devices
CN100489768C (en) Method and device for booting computer system
US11341063B2 (en) Systems and methods for safely detecting indeterminate states of ranges in a self-encrypting storage resource
US20060168440A1 (en) OS selection methods and computer systems utilizing the same
CN108121562B (en) Firmware version switching method, electronic device and BIOS chip
CN105760747A (en) Method for protecting intelligent equipment through power-on passwords and intelligent equipment
US20210365561A1 (en) Overriding sub-system identifiers with protected variable values
NZ533549A (en) Method and apparatus for booting a computer system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090520

Termination date: 20150615

EXPY Termination of patent right or utility model