Skip to content


Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?


Failed to load latest commit information.
Latest commit message
Commit time


Coordinated Restore at Checkpoint is an OpenJDK feature that provides a fast start and immediate performance for Java applications.

A Java application and JVM are started from an image in a warmed-up form. The image is created from a running Java instance at arbitrary point of time ("checkpoint"). The start from the image ("restore") continues from the point when checkpoint was made.

The restore in general is faster than initialization. After the restore, Java runtime performance is also on-par with the one at the checkpoint. So, after proper warm-up before the checkpoint, restored Java instance is able to deliver the best runtime characteristics immediately.

Coordinated Restore undisruptively introduces new before-checkpoint and after-restore phases in Java application lifecycle. In contrast with uncoordinated checkpoint/restore, coordination allows restored Java applications to behave differently. For example, it is possible to react on changes in execution environment that happened since checkpoint was done.

CRaC implementation creates the checkpoint only if the whole Java instance state can be stored in the image. Resources like open files or sockets are cannot, so it is required to release them when checkpoint is made. CRaC emits notifications for an application to prepare for the checkpoint and return to operating state after restore.

With more Java frameworks and libraries adopting CRaC, applications can benefit with little or no changes in the code. Moreover, the required amount of changes in the resource management code tends to be small, see examples below.

Coordinated Restore is not tied to a particular checkpoint/restore implementation and will able to use existing ones (CRIU, docker checkpoint/restore) and ones yet to be developed.


CRaC support was implemented in a few frameworks with the following results. The source code can be found in the Projects with CRaC support section.

The environment

  • laptop with Intel i7-5500U, 16Gb RAM and SSD.
  • Linux kernel 5.7.4-arch1-1
  • data was collected in container running ubuntu:18.04 based image
  • host operating system: archlinux

jdk14-crac build

How to reproduce

To reproduce you need to create a workspace directory and clone along next repositories:

You need to build examples according to the Projects with CRaC support section.

Then run

host$ docker build -t full-bench -f Dockerfile.full-bench utils
host$ docker run -it --privileged -v $HOME:$HOME -v $PWD:$PWD -w $PWD full-bench
cont# JDK=<path/to/jdk> bash ./utils/ collect
cont# exit
host$ bash ./utils/ parse
host$ cp *.data docs
host$ make -C docs

Last command regenerates graphs in the docs.

Startup Time

Spring Boot





OpenJDK CRaC Project is developed in

Latest release can be found in

$ sudo tar zxf <jdk>.tar.gz

NOTE: The JDK archive should be extracted with sudo.

When using CRaC, if you see an "Operation not permitted" error, you may have to update your criu permissions with:

sudo chown root:root $JAVA_HOME/lib/criu
sudo chmod u+s $JAVA_HOME/lib/criu

Projects with CRaC support


You can just add crac feature at!



Basic CRaC support is a part of Quarkus since 2.10.0.


Spring Boot

Spring Boot provides CRaC support as of version 3.2, for more details see:


Proof-of-Concept CRaC support implementation

Proof-of concept CRaC support was implemented in a few third-party frameworks and libraries.

Source code links are below. Builds can be found in Maven Central under io.github.crac artifact-id.

AWS Lambda

AWS Libs with CRaC allows implementation of AWS Lambda functions on CRaC JDK.


Example: (diff) is a sample Java serverless function on CRaC.


User's flow

CRaC deployment scheme reflects the need to collect data required for Java application initialization and warm-up.

Operation Flow

  1. a Java application (or container) is deployed in the canary environment
    • the app processes canary requests that triggers class loading and JIT compilation
  2. the running application is checkpointed by some mean
    • this creates the image of the JVM and application; the image is considered as a part of a new deployment bundle
  3. the Java application with the image are deployed in the production environment
    • the restored Java process uses loaded classes from and JIT code from the immediately

WARNING: next is a proposal phase and is subject to change

Please refer to the Projects with CRaC support section, step-by-step guide or best practices guide to get an application with CRaC support. The rest of the section is written for the spring-boot example.

For the first, Java command line parameter -XX:CRaCCheckpointTo=PATH defines a path to store the image and also allows the java instance to be checkpointed. By the current implementation, the image is a directory with image files. The directory will be created if it does not exist, but no parent directories are created.

export JAVA_HOME=./jdk
$JAVA_HOME/bin/java -XX:CRaCCheckpointTo=cr -jar target/example-spring-boot-0.0.1-SNAPSHOT.jar

For the second, in another console: supply canary worload ...

$ curl localhost:8080
Greetings from Spring Boot!

... and make a checkpoint by a jcmd command

$ jcmd target/example-spring-boot-0.0.1-SNAPSHOT.jar JDK.checkpoint
Command executed successfully

Due to current jcmd implementation, success is always reported in jcmd output, problems are reported in the console of the application.

Another option to make the checkpoint is to invoke the jdk.crac.Core.checkpointRestore() method (see API). More options are possible in the future.

For the third, restore the cr image by -XX:CRaCRestoreFrom=PATH option

$JAVA_HOME/bin/java -XX:CRaCRestoreFrom=cr

CPU Features

When running checkpoint and restore on different computers you may seen an error message during restore

You have to specify -XX:CPUFeatures=[...] together with -XX:CRaCCheckpointTo when making a checkpoint file; specified -XX:CRaCRestoreFrom file contains CPU features [...]; missing features of this CPU are [...]

See more details about the CPU Features configuration.

Programmer's flow

Programs may need to be adjusted for use with Coordinated Restore at Checkpoint.

A step-by-step guide and best practices guide provide information on how to implement the CRaC support in the code.

Another option is to use an existing framework with CRaC support.

No changes required:

With configuration changes:


The CRaC API is not a part of Java SE specification. We hope that eventually it will be there, until then there are different packages that can be used.


This is the API that is implemented in the CRaC JDK.

Please refer to org.crac if you are looking to add CRaC support to a code that should also work on a regular JDK/JRE.


The package is provided by org.crac compatibility library.

The org.crac is designed to provide smooth CRaC adoption. Users of the library can build against and use CRaC API on Java runtimes with jdk.crac, javax.crac, or without any implementation.

  • In compile-time, org.crac package totally mirrors jdk.crac and javax.crac.
  • In runtime, org.crac uses reflection to detect CRaC implementation. If the one is available, all requests to org.crac are passed to the implementation. Otherwise, requests are forwarded to a dummy implementation.

The dummy implementation allows an application to run but not to use CRaC:

  • resources can be registered for notification,
  • checkpoint request fails with an exception.

Implementation details

Current OpenJDK implementation is based on using the CRIU project to create the image.

CRIU hosts a few changes made to improve CRaC usability.

You can read more about debugging C/R issues in your application in the debug guide.


Sometimes it might be difficult to alter the application to properly coordinate with the checkpoint (e.g. due to a code in a library you cannot modify). As a temporary workaround you can configure file-descriptor policies.


No description, website, or topics provided.






No releases published


No packages published