CN117850827A - Domestic operating system security upgrading device and method with transaction characteristics - Google Patents

Domestic operating system security upgrading device and method with transaction characteristics Download PDF

Info

Publication number
CN117850827A
CN117850827A CN202311606351.2A CN202311606351A CN117850827A CN 117850827 A CN117850827 A CN 117850827A CN 202311606351 A CN202311606351 A CN 202311606351A CN 117850827 A CN117850827 A CN 117850827A
Authority
CN
China
Prior art keywords
upgrading
upgrade
backup
transaction
transaction module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311606351.2A
Other languages
Chinese (zh)
Inventor
孙泽奇
钱宝生
周娜
干家东
王福喜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 15 Research Institute
Original Assignee
CETC 15 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 15 Research Institute filed Critical CETC 15 Research Institute
Priority to CN202311606351.2A priority Critical patent/CN117850827A/en
Publication of CN117850827A publication Critical patent/CN117850827A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides a domestic operation system security upgrading device and method with transaction characteristics, which can automatically track the upgrading process of a system and provide system security guarantee. By automatically detecting various upgrade behavior scenes of the system, automatically sensing an upgrade event, automatically completing creation of a system environment history node before upgrade operation of the system, automatically judging a final result of the system upgrade and automatically taking a series of key functions such as corresponding measures according to the upgrade scene and the upgrade state, realizing automatic recovery of the system without sense of a user under the condition that the system upgrade fails or the upgrade is successful but serious system defects exist, and guaranteeing the upgrade reliability of the system.

Description

Domestic operating system security upgrading device and method with transaction characteristics
Technical Field
The invention belongs to the technical field of software design development operation and maintenance, and particularly relates to the field of upgrading and maintenance of domestic operating systems.
Background
In recent years, the development of domestic operating systems has made significant progress. With the advancement of national informatization construction and the improvement of information security consciousness, the demands of domestic enterprises and institutions on autonomous and controllable operating systems are continuously increasing. To meet this demand, many domestic enterprises and research institutions are actively developing research and development work on operating systems, and a series of domestic operating systems with independent intellectual property rights are proposed. The development of domestic operating systems has undergone initial fumbling and practice, gradually transitioning from academic research to commercial applications. At present, a plurality of domestic operating systems are widely applied in the fields of government authorities, public institutions, financial institutions and the like.
However, there are challenges and problems in upgrading and upgrading domestic operating systems. First, because of the small user population of domestic operating systems, their ecosystem and software support is also relatively weak compared to internationally known operating systems. In the process of updating and upgrading the domestic operating system, the problems of compatibility and stability can be encountered. Secondly, the update and upgrade mechanism and flow of the domestic operating system are further improved. The upgrade modes of the domestic operating systems widely used at present are divided into two types: operating system overlay upgrades and operating system incremental upgrades. An overlay upgrade is a way to directly install a new version of the operating system as a whole onto the original operating system. In the overlay upgrade, the new version of the operating system may completely overlay the files and configuration of the original operating system to implement the upgrade. The overlay upgrade is typically implemented by an installer or an image file. However, the overlay upgrade does not have transactional properties, and the atomicity and consistency of the upgrade process cannot be guaranteed, which may lead to a risk of data loss or configuration loss. If an error or interruption occurs in the upgrading process, the original system files and configuration are already covered, and cannot be rolled back to the state before the upgrading, which may cause data irrecoverability or instability of the system. In addition, the overlay upgrade cannot protect and rollback the user data because it only focuses on the updates of the operating system itself and not on the changes in the user data. Incremental upgrades are a partial upgrade that follows specific changes in components or functions, with the aim of reducing the time and bandwidth consumption required for the upgrade. In incremental upgrades, only the changed portions will be updated, while the unchanged portions remain unchanged. Incremental upgrades are typically implemented by downloading an update package or applying a patch. When a component of an operating system may need to repair a vulnerability or add new functionality, only that component may be updated while other components remain unchanged. Also, incremental upgrades do not have transactional properties, and if an error or interrupt occurs during an upgrade, it may result in the system being in an unstable state, since only some components are updated, while other components remain old versions. Incremental upgrades may face compatibility issues when handling complex system changes, which may result in corruption or inconsistency of dependencies for system changes involving multiple components or modules, thereby affecting the normal operation of the system. Furthermore, incremental upgrades do not protect and rollback software configuration and user data because it only focuses on changes in specific components or functions, not on the state of the overall system.
Disclosure of Invention
In view of the above, the present invention provides a method and apparatus for safely upgrading a domestic operating system with transaction characteristics. The invention can automatically track the upgrading process of the system and provide system security guarantee. By automatically detecting various upgrade behavior scenes of the system, automatically sensing an upgrade event, automatically completing creation of a system environment history node before upgrade operation of the system, automatically judging a final result of the system upgrade and automatically taking a series of key functions such as corresponding measures according to the upgrade scene and the upgrade state, realizing automatic recovery of the system without sense of a user under the condition that the system upgrade fails or the upgrade is successful but serious system defects exist, and guaranteeing the upgrade reliability of the system. The transaction consists of a plurality of necessary execution steps, and each step is an atomic operation; a transaction module consists of a set of transactions of related functions.
The domestic operation system safety upgrading device with the transaction characteristics comprises a system upgrading operation transaction module, a system upgrading automatic backup transaction module, a system configuration/user data upgrading protection transaction module, a system shadow upgrading and restoring transaction module and a system upgrading rollback transaction module, wherein the system upgrading operation transaction module is used for starting a system upgrading patch and detecting an upgrading state; the system upgrading automatic backup transaction module is used for creating a system history node and creating a shadow upgrading and restoring transaction module as an environment for restoring function operation; the system configuration/user data upgrading protection transaction module is triggered by the system upgrading automatic backup transaction module and is used for system configuration and backup and restoration of user data; the system shadow upgrading and restoring transaction module is used for determining whether the upgrading is successful or not when the system is started for the first time after the system upgrading is completed, and calling the system upgrading rollback transaction module to execute system rollback if the upgrading is successful.
Further, the system upgrade operation transaction module specifically includes:
firstly, starting a system upgrade patch, wherein an upgrade preprocessing interface in the patch triggers a system upgrade automatic backup transaction module;
and secondly, calling a system hook function, automatically detecting the upgrade operation state, and writing a detection result into a hidden file with a fixed address, wherein the detection result comprises a state in the system upgrade process and a state after the system upgrade is completed.
Further, the system upgrade patch comprises a designated upgrade file, a designated system upgrade operation specification, a detection of the current system upgrade operation and a custom interface added with an active trigger upgrade preprocessing interface; the system upgrade detection device comprises a system upgrade detection device, an upgrade detection device and an upgrade detection device, wherein the system upgrade detection device is used for monitoring a current upgrade event and collecting upgrade execution results, and the active upgrade triggering pretreatment interface is used for triggering a system upgrade automatic backup transaction module; the system hook function comprises a detection system hook function in a system package management tool and a response event system hook function, wherein the two hook functions are respectively used for calling interfaces for detection and response to upgrade operations, and the upgrade operations comprise operation events for changing system files in the upgrade process.
Further, the system upgrade automatic backup transaction module specifically includes:
after being triggered by the upgrade preprocessing interface, a system history node is firstly established and is used for providing incremental backup information for a system configuration/user data upgrade protection transaction module;
second, a temporary file system initrd is created, which is the environment in which the shadow upgrade and restore transaction module operates as a restore function.
Further, the system configuration/user data upgrading protection transaction module comprises a backup transaction part and a restoration transaction part, wherein the system configuration comprises network connection configuration, system security configuration, timing task configuration, network equipment configuration, system starting file configuration, software source configuration, desktop starting item configuration of a system scope and system global environment variable configuration; user data is system partitions, directories and files specified by a user prior to initiating a system upgrade operation transaction;
the backup transaction part is triggered by a system automatic upgrading backup transaction module, and performs system configuration data backup, integrity check of the system configuration data backup, log record of the system configuration data backup and user data backup according to the created system history node; meanwhile, in the backup process, the backup files are subjected to informatization processing, including adding custom names, backup time, remarking information, basic attributes of source files and hash values of the backup files;
the restoring transaction part is triggered by the system upgrading rollback transaction module and is used for carrying out system configuration data restoring, system configuration data backup management, log record of system configuration data restoring, user data restoring and user data backup management.
Further, the system shadow upgrading and restoring transaction module specifically refers to a temporary file system when the system is started for the first time after upgrading, reads the state after the system upgrading is completed, judges that the system upgrading is successful only if the user system upgrading operation is successful and the running state after the system upgrading is successful, starts normally, and finishes the upgrading, otherwise, the result is that the upgrading fails, and automatically enters the system upgrading rollback transaction module.
Furthermore, the system upgrade rollback transaction module specifically refers to rollback to a system history node, or performing restoration by using an offline system backup file, and ending the restoration.
A domestic operation system security upgrading method with transaction characteristics comprises the following steps:
starting an upgrading process in a system upgrading operation transaction module, triggering a system upgrading automatic backup transaction module through an upgrading preprocessing interface, and in the system upgrading automatic backup transaction module, creating a system history node and a temporary file system initrd, triggering a system configuration/user data upgrading protection transaction module after the system history node is created, so as to complete a backup transaction part; when the system is started for the first time after finishing upgrading, the temporary file system is accessed, the system shadow upgrading and restoring transaction module reads the upgrading result and judges whether the upgrading is successful or not, if the system upgrading fails, the system upgrading rollback transaction module is started to restore the original system, and if the system upgrading fails, the normal starting flow is accessed.
Furthermore, the transaction type and incremental backup upgrading method supports two scenes of online upgrading and offline upgrading, wherein online upgrading is divided into online issuing and installing of system upgrading patch packages manufactured in a standardized mode, and two upgrading modes of package management are carried out through software sources and package management commands (apt, apt-get and the like). The method for supporting the optical disk and the U disk by offline upgrading comprises two upgrading modes of local execution installation of a system upgrading patch package manufactured in a standardized mode and local deb software package installation through package management command (dpkg).
Furthermore, the user of the operating system can carry out self-defined backup on the system before the system is upgraded, the system upgrading state is detected and judged after the system is upgraded, and if the system is failed to upgrade, the user can restore by utilizing the system backup or automatically roll back to the state before the system is upgraded through the shadow system environment so as to restore the normal running environment of the system.
Advantageous effects
1. The atomicity and consistency of the system upgrading process are ensured. The domestic operation system security upgrading method with the transaction characteristics can effectively avoid the problems of data loss, configuration loss, system instability and the like by ensuring the atomicity and consistency, and provides better upgrading experience and data protection for users.
2. And the upgrading reliability of the domestic operating system is improved. The domestic operation system safety upgrading method with the transaction characteristics realizes the noninductive upgrading of the user and the lossless restoration and recovery of the system under the conditions of upgrading failure and the like, and ensures the high reliability, the integrity and the safety of the whole system upgrading.
3. The invention can automatically track the upgrading process.
4. The invention can automatically roll back the original system under the condition that the system upgrade fails or the system defect exists.
5. The invention can realize the functions of integrity protection, version rollback, software configuration and upgrade protection of user data in the upgrade process of the operating system.
Drawings
FIG. 1 is a block diagram of a system of the present invention
FIG. 2 is a diagram of a security upgrade of a domestic operating system with transactional properties
FIG. 3 is a schematic diagram of a system upgrade integrity protection design
Detailed Description
The invention is further described with reference to fig. 1, 2 and 3.
The method for safely upgrading the domestic operating system with the transaction characteristics ensures low coupling among the transactions by reasonably logically planning the transactions. Each transaction consists of a plurality of necessary execution steps, each step can be regarded as an atomic operation, and the execution state of each step is checked in the execution process so as to ensure the correct execution of the logic sequence of each transaction. The various functions of the corresponding transaction are completed through a series of operational steps, with a specific one of each transaction consisting of a series of different atomic operations. Meanwhile, the record collection and management functions of the upgrade process log are provided.
The active detection function for the system upgrade behavior is mainly realized from two aspects. Firstly, a reasonable system upgrade patch making specification is formulated, and when a system is upgraded by executing the system upgrade patch of the specification, a custom interface actively triggers an upgrade preprocessing interface so as to perform the creation operation of a system environment history node; and secondly, detecting the specific operation of the system by adopting a system hook mode to respond to the basis, and automatically detecting the upgrading operation by adding hook function call in a specific functional module of a software package management tool in the system when the system installs/uninstalls the software package through commands such as apt, dpkg and the like.
The preprocessing interface before upgrading is mainly used for creating the system history node. The system environment history node creation before the system upgrade is mainly completed through a specific functional interface provided by backup and restore software, and an incremental backup mode is preferably adopted to ensure that the whole process has excellent space efficiency and time efficiency.
The system upgrading state and the running state after the system upgrading are effectively judged, and the result of the system upgrading operation and the system starting state after the system upgrading are required to be confirmed respectively and sequentially. If the upgrade operation fails to be executed, the system upgrade can be directly considered to be failed when the system starting state after the upgrade operation is not required to be confirmed again; if the result of the system upgrade operation is successful, at least one system start experiment is needed to confirm the running state after the system upgrade, wherein the running state is mainly measured by the standard of whether the system can be started or not, so as to eliminate major faults beyond upgrade expectations such as non-starting and the like. Whether the system can be started or not is mainly judged by whether each key program in the starting operation process of the system normally operates or not, such as init (systemd), xorg, lightlm/gdm and the like. And only if the operation result of the system upgrade of the user and the operation state result of the system upgrade pass, the system upgrade is considered to be successful, otherwise, abnormal state processing measures are needed to be taken, and the state before the upgrade operation is recovered.
The system is automatically recovered, and the upgrade result of the system needs to be effectively judged and obtained, and an executable environment for system recovery needs to be provided. The system upgrade customization function completes the collection of the system upgrade operation result through the hook function under two main approaches, and the result information is written into the fixed address hidden file. The mode of judging the running state after the system is upgraded is as follows: the result is preset as failure before upgrading, and after the system is upgraded and restarted, the last preset service is set as success after being started. The automatic backup and restoration of the system upgrade provides a restoring function running environment through a customized temporary file system (initrd), reads specific files in the customized temporary file system when the system is started, completes the acquisition of a system upgrade result, and automatically calls a system restoring customization interface to restore the operation of the system. Because initrd is a temporary file system before the root file system is mounted and before the init program is executed, the function customization of automatic restoration is carried out in the initrd, and the restoration operation can be more quickly executed under the condition of failure in upgrading without entering a normal starting system environment.
The system upgrade integrity protection design is as follows:
the system upgrade integrity is protected, the transaction realization modules are divided for the whole upgrade function, and low coupling among the transactions is ensured; and carrying out logic planning on each module of the upgrading transaction, and simultaneously carrying out state inspection on each transaction and setting and checking a transaction execution state mark so as to ensure the correct execution of the transaction logic sequence and provide the record collection and management functions of the upgrading process log.
In order to realize the protection of upgrade integrity, the whole upgrade mechanism is required to be subjected to transaction division, different transactions are subjected to modularization realization, the execution sequence of each transaction and each specific operation execution module in the transaction module is reasonably planned according to the functional design, the execution result is checked to ensure the reliability of the upgrade state, each flow state in the upgrade process is recorded, and the traceability of the upgrade operation information state is ensured. The upgrading process carries out necessary log output and classification record and supports management functions such as log file dumping and the like.
The system upgrade level comprises transaction modules such as automatic backup of system upgrade, operation of system upgrade, upgrade protection of system configuration/user data, rollback of system upgrade, restoration of system shadow upgrade and the like, and the functions of the transaction modules are relatively independent and are related to each other. The system upgrading and backup related operation needs to be completed before the system upgrading transaction is executed to ensure the reliability of the system lossless upgrading, and the system restoring related transaction module needs to be realized after the system backup related transaction module is completed. The necessary logic design is realized by controlling and confirming the completion state among all transaction modules, so that the availability of the transaction modules for system upgrading is ensured, and the reliability of the lossless upgrading function of the system is provided.
Each transaction module consists of a plurality of necessary execution steps, and various functions of the corresponding transaction module are completed through a series of operations. The transaction modules are necessary to comb the function implementation steps, so that each step can be executed correctly and orderly, each step can be regarded as an atomic operation, and each function of the transaction module consists of a series of different atomic operations.
The system upgrade version rollback design is as follows:
in order to ensure that the system can be rolled back during upgrading, the support of the related functions of automatic backup of the system is needed, and the basic condition of rollback is ensured; and the system upgrading process state and the completion state are monitored, the judgment and automatic processing of the system upgrading state are increased, and the operation and maintenance cost of the system is reduced.
The user of the operating system can also carry out self-defined backup on the system before the system is upgraded, the system upgrading state is detected and judged after the system is upgraded, and if the system upgrading fails, the user can restore by utilizing the system backup or automatically rolls back to the state before the system upgrading through the shadow system environment so as to restore the normal running environment of the system.
Before the system upgrade operation, the automatic backup of the system, the detection, analysis and rollback treatment related measures of the abnormal state of the system upgrade are adopted in the upgrade operation process and after the upgrade operation is finished. The system is provided with the function of restoring the system through backup files after upgrading operation by combining with the environment foundation that the user can freely backup.
The system upgrade can rollback to support two scenes of online upgrade and offline upgrade, and fully cover the actual upgrade use environment of the user. The online upgrade is mainly divided into two upgrade modes of online issuing and installing of a customized patch package and package management through a software source and package management commands (apt, apt-get and the like), and the offline upgrade supports modes of an optical disc, a U disk and the like and mainly comprises two upgrade modes of local execution installation of the customized patch package and local deb software package installation through package management commands (dpkg). The method meets two scenes of online upgrading and offline upgrading, needs to provide a customized system upgrading response interface for upgrading patch package calling, and needs to automatically detect when package management command tools such as apt, apt-get, dpkg and the like execute package management operation so as to realize automatic implementation of rollback conditions in the upgrading scene.
To achieve version rollback, the operating system is required to provide a specified upgrade interface, determine system-specific upgrade operations, and take default incremental backup operations. And the backup and restore functions and the shadow system environment are used for respectively providing restoring capability and automatically restoring the working environment.
The realization of the appointed upgrade interface mainly comprises the steps of setting a specific upgrade file, appointing a system upgrade operation standard and accurately finding out the system upgrade operation. Meanwhile, corresponding detection and coping mechanisms can be added through a system package management tool, operations of changing the system files, such as software package installation and uninstallation, are monitored, and backup management of the system files is carried out before the actual change of the system files occurs.
Software configuration upgrade protection implementation:
the software configuration upgrade protection mainly comprises system configuration data backup, system configuration data restoration, system configuration data backup management, integrity check of the system configuration data backup, log records of operations such as system configuration data backup and restoration, and the like.
In the process of using domestic operating systems, the system related service configuration files often need to be manually changed, or the system configuration data files are updated by upgrading the implementation of installation software packages, and the operations have risks of manual configuration errors, incompatible versions, abnormal software installation and the like. The error of the content of the system configuration data file or the file abnormality often causes the corresponding system service to have function abnormality and the starting abnormality of the service program, and seriously affects the normal operation of the system. If the configuration of these abnormal services cannot be restored in time, serious consequences may occur. In order to avoid the situation that the system service cannot be used normally, even the system cannot run normally, a convenient system configuration file protection measure is required to be provided for the system upgrade scene, so that the correct system configuration file is ensured to exist, and the system configuration file can be restored under the condition of abnormal configuration.
The software configuration data includes network connection configuration, system security configuration, timing task configuration, network device configuration, system start-up file configuration, software source configuration, system-wide desktop start-up item configuration, system global environment variable configuration related files, and the like.
After the related operation is completed, if the system service is abnormal in operation or the verification condition is not expected, the recovery of the system configuration data can be performed through the system configuration data recovery function provided by the software data upgrading protection.
In order to improve the usability of the function, ensure that the backup and restoration of the system configuration files and the installation and operation check of the management process of the backup files are carried out by a user, and the data upgrading protection also has a backup information checking function and an operation information recording function.
In order to ensure the safety, a hash check value is generated and stored after the backup of the system configuration file is completed, and before the system configuration file is restored, whether the backup file is consistent with the original backup file is checked, so that the system safety and the operation reliability are ensured. When the user performs operations such as backup or restore, at least one piece of log information is correspondingly generated aiming at the operations and the execution process of the user and recorded in the file for audit and review.
Before the system configuration file is changed, the user can backup the appointed relevant service configuration file of the system, and the functional module corresponding to the functional module backs up the corresponding service configuration file to the backup restoring partition according to the user operation. In the process of backup, the backup files are simultaneously processed in an informatization mode, and the information comprises the user-defined name, backup time, remark information, basic attributes of the backup files, hash values of the backup files and other necessary manageable information of the backup files. After the configuration is completed, the user can check the current backup information through the functional interface, delete the backup file and the like, and restore the service configuration file corresponding to the system through the backup file.
In order to realize one-key backup of common related service configuration files, corresponding service related configuration file information needs to be confirmed and collected in advance. When the system configuration upgrade protection receives a system configuration data backup task, the configuration data information of the corresponding service selected by the user can be matched through a preset configuration file, and then the backup is directly carried out, so that the backup of the system configuration file of the corresponding service can be completed without manual selection of the user.
User data upgrade protection implementation:
the user data upgrade protection mainly provides functions of user data backup, user data restoration, user data backup management, user custom directory data backup management, user custom directory data restoration and the like.
The user has the risk of damaging and losing the user data in the system upgrading and daily high-risk operation, and when the user data is damaged or lost, the data can be recovered through the backup file. The user can backup the whole data partition, such as a/home partition,/data partition, and the like, and can also backup some directory data files in the data partition.
Before high-risk operation or in a specific scene, a user can perform backup operation on the appointed system partition or the catalogue/file of the appointed path, and the functional module corresponding to the functional module backs up corresponding content to the backup restoring partition according to the selection of the user. In the process of backup, the backup files are simultaneously processed in an informatization mode, and the information comprises the user-defined name, backup time, remark information, basic attributes of the backup files, hash values of the backup files and other necessary manageable information of the backup files. After the user finishes the backup, the current backup information can be checked through the functional interface, the backup files can be deleted and the like, and the corresponding user data files can be restored through the backup files.

Claims (10)

1. A domestic operation system safety upgrade device with transaction characteristics is characterized by comprising: the system comprises a system upgrading operation transaction module, a system upgrading automatic backup transaction module, a system configuration/user data upgrading protection transaction module, a system shadow upgrading and restoring transaction module and a system upgrading rollback transaction module, wherein the system upgrading operation transaction module is used for starting a system upgrading patch and detecting an upgrading state; the system upgrading automatic backup transaction module is used for creating a system history node and creating a shadow upgrading and restoring transaction module as an environment for restoring function operation; the system configuration/user data upgrading protection transaction module is triggered by the system upgrading automatic backup transaction module and is used for system configuration and backup and restoration of user data; the system shadow upgrading and restoring transaction module is used for determining whether the upgrading is successful or not when the system is started for the first time after the system upgrading is completed, and calling the system upgrading rollback transaction module to execute system rollback if the upgrading is successful.
2. The device for securely upgrading a domestic operating system having transaction characteristics according to claim 1, comprising: the system upgrading operation transaction module specifically comprises:
firstly, starting a system upgrade patch, wherein an upgrade preprocessing interface in the patch triggers a system upgrade automatic backup transaction module;
and secondly, calling a system hook function, automatically detecting the upgrade operation state, and writing a detection result into a hidden file with a fixed address, wherein the detection result comprises a state in the system upgrade process and a state after the system upgrade is completed.
3. A domestic operating system security upgrade apparatus with transaction characteristics according to claim 2, comprising: the system upgrade patch comprises a designated upgrade file, a designated system upgrade operation specification, a detection of the upgrade operation of the system, and a custom interface added with an active trigger upgrade preprocessing interface; the system upgrade detection device comprises a system upgrade detection device, an upgrade detection device and an upgrade detection device, wherein the system upgrade detection device is used for monitoring a current upgrade event and collecting upgrade execution results, and the active upgrade triggering pretreatment interface is used for triggering a system upgrade automatic backup transaction module; the system hook function comprises a detection system hook function in a system package management tool and a response event system hook function, wherein the two hook functions are respectively used for calling interfaces for detection and response to upgrade operations, and the upgrade operations comprise operation events for changing system files in the upgrade process.
4. A domestic operating system security upgrade apparatus with transaction characteristics according to claim 3, comprising: the automatic backup transaction module for system upgrade specifically comprises,
after being triggered by the upgrade preprocessing interface, a system history node is firstly established and is used for providing incremental backup information for a system configuration/user data upgrade protection transaction module;
second, a temporary file system initrd is created, which is the environment in which the shadow upgrade and restore transaction module operates as a restore function.
5. The device for securely upgrading a domestic operating system having transaction characteristics according to claim 4, comprising: the system configuration/user data upgrading protection transaction module comprises a backup transaction part and a restoration transaction part, wherein the system configuration comprises network connection configuration, system security configuration, timing task configuration, network equipment configuration, system start file configuration, software source configuration, desktop start item configuration of a system scope and system global environment variable configuration; user data is system partitions, directories and files specified by a user prior to initiating a system upgrade operation transaction;
the backup transaction part is triggered by a system automatic upgrading backup transaction module, and performs system configuration data backup, integrity check of the system configuration data backup, log record of the system configuration data backup and user data backup according to the created system history node; meanwhile, in the backup process, the backup files are subjected to informatization processing, including adding custom names, backup time, remarking information, basic attributes of source files and hash values of the backup files;
the restoring transaction part is triggered by the system upgrading rollback transaction module and is used for carrying out system configuration data restoring, system configuration data backup management, log record of system configuration data restoring, user data restoring and user data backup management.
6. The device for securely upgrading a domestic operating system having transaction characteristics according to claim 5, comprising: the system shadow upgrading and restoring transaction module specifically refers to a temporary file system when the system is started for the first time after upgrading, reads the state after the system upgrading is completed, judges that the upgrading is successful only if the user system upgrading operation is successful and the running state is successful after the system upgrading, starts normally, finishes the upgrading, otherwise, results in upgrading failure, and automatically enters the system upgrading rollback transaction module.
7. The device for securely upgrading a domestic operating system having transaction characteristics according to claim 6, comprising: the system upgrading rollback transaction module specifically refers to rollback to a system history node, or is restored by using an offline system backup file, and the restoration is finished.
8. A domestic operation system safety upgrading method with transaction characteristics is based on any upgrading device of claims 1-7, and is characterized by comprising the following steps:
starting an upgrading process in a system upgrading operation transaction module, triggering a system upgrading automatic backup transaction module through an upgrading preprocessing interface, and in the system upgrading automatic backup transaction module, creating a system history node and a temporary file system initrd, triggering a system configuration/user data upgrading protection transaction module after the system history node is created, so as to complete a backup transaction part; when the system is started for the first time after finishing upgrading, the temporary file system is accessed, the system shadow upgrading and restoring transaction module reads the upgrading result and judges whether the upgrading is successful or not, if the system upgrading fails, the system upgrading rollback transaction module is started to restore the original system, and if the system upgrading fails, the normal starting flow is accessed.
9. The method for securely upgrading a domestic operating system with transaction characteristics according to claim 8, wherein the method comprises the steps of: the method supports two scenes of online upgrading and offline upgrading, wherein an online upgrading stage is divided into two upgrading modes of online issuing and installing of a system upgrading patch package and package management through a software source and package management commands; the method for supporting the optical disk and the U disk by offline upgrading comprises two upgrading modes of local execution installation of a system upgrading patch package and local deb software package installation through a package management command.
10. The method for securely upgrading a domestic operating system having transaction characteristics according to claim 9, wherein: the user of the operating system can also carry out self-defined backup on the system before the system is upgraded, the system upgrading state is detected and judged after the system is upgraded, and if the system upgrading fails, the user can restore by utilizing the system backup.
CN202311606351.2A 2023-11-28 2023-11-28 Domestic operating system security upgrading device and method with transaction characteristics Pending CN117850827A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311606351.2A CN117850827A (en) 2023-11-28 2023-11-28 Domestic operating system security upgrading device and method with transaction characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311606351.2A CN117850827A (en) 2023-11-28 2023-11-28 Domestic operating system security upgrading device and method with transaction characteristics

Publications (1)

Publication Number Publication Date
CN117850827A true CN117850827A (en) 2024-04-09

Family

ID=90544098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311606351.2A Pending CN117850827A (en) 2023-11-28 2023-11-28 Domestic operating system security upgrading device and method with transaction characteristics

Country Status (1)

Country Link
CN (1) CN117850827A (en)

Similar Documents

Publication Publication Date Title
US8719809B2 (en) Point in time rollback and un-installation of software
CN101436138B (en) Control device and control method for software upgrade and dynamic rolling back
CN107844386B (en) Data backup and recovery method and device
JP4321705B2 (en) Apparatus and storage system for controlling acquisition of snapshot
CN102216905B (en) Method and system for creating application restore point for application operated in computer system
US6161218A (en) Software patch architecture
US8886995B1 (en) Fault tolerant state machine for configuring software in a digital computer
CN106951345B (en) Consistency test method and device for disk data of virtual machine
CN111580929A (en) Validity verification system and method based on virtual machine protection data
US20080209261A1 (en) Data repair and synchronization method of dual flash read only memory
CN109032838B (en) Automatic verification method for consistency of backup and recovery data of virtual machine
US7080279B2 (en) Autonomic rollback
US7640454B1 (en) System and method for point-in-time recovery of application resource sets
CN111562934A (en) Software system upgrading method based on hot patch, terminal and storage medium
CN101196839A (en) Data renovation and synchronization process of double-flash read-only memory
CN111651304A (en) Software recovery method and device based on double-core intelligent electric meter and computer equipment
CN114741096A (en) Upgrade processing method, device and storage medium
CN100476745C (en) Method for implementing automatic fault-tolerance of image file in Linux operating system booting process
CN115567392B (en) Automatic deployment upgrading method for customer internal service system
CN117850827A (en) Domestic operating system security upgrading device and method with transaction characteristics
JP2005284902A (en) Terminal device, control method and control program thereof, host device, control method and control program thereof, and method, system, and program for remote updating
JP3048792B2 (en) Method of automatically replacing operating system and computer system using the same
CN111897583A (en) Equipment starting method and embedded equipment
US20030126159A1 (en) Method and system for rollback of software system upgrade
KR102221593B1 (en) System for maintaining the installation envoronment of computer terminals

Legal Events

Date Code Title Description
PB01 Publication