Abstract
Virtual private servers and application checkpoint and restart are two advanced operating system features which place different but related requirements on the way kernel-provided resources are accessed by userspace. In Linux, kernel resources, such as process IDs and SYSV shared messages, have traditionally been identified using global tables. Since 2005, these tables have gradually been transformed into per-process namespaces in order to support both resource availability on application restart and virtual private server functionality. Due to inherent differences in the resources themselves, the semantics of namespace cloning differ for many of the resources. This paper describes the existing and proposed namespaces as well as their uses.
- Amnon Barak and Oren La'adan. The MOSIX Multicomputer Operating System for High Performance Cluster Computing. Future Generation Computer Systems, 13:361--372, 1998. Google ScholarDigital Library
- Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the Art of Virtualization. ACM symposium on Operating systems principles, 2003. Google ScholarDigital Library
- Fabrice Bellard. QEMU, a Fast and Portable Dynamic Translator. Usenix Annual Technical Conference, 2005. Google ScholarDigital Library
- Jonathan Corbet. A System Call for Unsharing. http://lwn.net/Articles/135321/, 2005.Google Scholar
- Fred Douglis and John Ousterhout. Transparent Process Migration: Design Alternatives and the Sprite Implementation. Software - Practice and Experience, 21(8):757--785, 1991. Google ScholarDigital Library
- Jason Duell, Paul Hargrove, and Eric Roman. The Design and Implementation of Berkeley Labs Linux Checkpoint/Restart. http://ftg.lbl.gov/CheckpointRestart/CheckpointRestart.shtml, 2003.Google Scholar
- Pavel Emelyanov and Kir Kolyshkin. PID Namespaces in the 2.6.24 Kernel. http://lwn.net/Articles/259217/, 2007.Google Scholar
- Bryan Ford, Mike Hibler, Jay Lepreau, Patric Tullmann, Godmar Back, and Stephen Clawson. Microkernels Meet Recursive Virtual Machines. Proceedings of the Second Symp. on Operating Systems Design and Implementation, pages 137--151, 1996. Google ScholarDigital Library
- Kenneth Geisshirt. Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers. Packt Publishing, 2006.Google Scholar
- Cedric Le Goater, Daniel Lezcano, Clement Calmels, Dave Hansen, Serge Hallyn, and Hubertus Franke. Making applications mobile using containers. Proceedings of the Ottawa Linux Symposium, pages 347--367, 2006.Google Scholar
- Robert P. Goldberg. Survey of Virtual Machine Research. IEEE Computer, pages 34--45, June 1974.Google ScholarDigital Library
- Serge Hallyn. BSD Jail Functionality for Linux. http://sourceforge.net/projects/linuxjail/, 2004.Google Scholar
- Serge Hallyn. cgroups: Implement Device Whitelist LSM. http://lwn.net/Articles/273208/, 2008.Google Scholar
- Serge E. Hallyn and Ram Pai. Applying Mount Namespaces. http://www.ibm.com/developerworks/linux/library/l-mount-namespaces.html, 2007.Google Scholar
- IBM. IBM Workload Partitions Manager for AIX. http://www-03.ibm.com/systems/p/os/aix/sysmgmt/wpar/.Google Scholar
- IBM. Customer Engineering Announcement: IBM System/360. http://archive.computerhistory.org/resources/text/IBM/IBM.System_360.1964.102646081.pdf, 1964.Google Scholar
- Cray Inc. Cray X1 System Overview - S-2346-23. Cray software distribution center, 2002.Google Scholar
- NSA Information Systems Security Organization. Labeled Security Protection Profile. http://www.commoncriteriaportal.org/files/ppfiles/lspp.pdf, 1999.Google Scholar
- Poul-Henning Kamp and Robert Watson. Jails: Confining the Omnipotent Root. SANE, 2000.Google Scholar
- Avi Kivity, Yaniv Kamay, Dor Laor, Uri Lublin, and Anthony Liguori. kvm: the Linux Virtual Machine Monitor. Proceedings of the Linux Symposium, 2007.Google Scholar
- Oren Laadan and Jason Nieh. Transparent Checkpoint-Restart of Multiple Processes on Commodity Operating Systems. Usenix Annual Technical Conference, pages 323--336, 2007. Google ScholarDigital Library
- Charles R. Landau. The Checkpoint Mechanism in KeyKOS. Proceedings of the Second International Workshop on Object Orientation in Operating Systems, september 1992.Google Scholar
- Michael Litzkow, Todd Tannenbaum, Jim Basney, and Miron Livny. Checkpoint and Migration of UNIX Processes in the Condor Distributed Processing System. http://www.cs.wisc.edu/condor/doc/ckpt97.pdf, 1997.Google Scholar
- Miron Livny and the Condor team. Condor: Current Limitations. http://www.cs.wisc.edu/condor/manual/v6.4/1_4Current_Limitations.html.Google Scholar
- Peter Loscocco and Stephen Smalley. Integrating Flexible Support for Security Policies into the Linux Operating System. USENIX Annual Technical Conference, FREENIX Track, pages 29--42, 2001. Google ScholarDigital Library
- Michael MacIsaac, Mike Duffy, Martin Soellig, and Ampie Vos. S/390 Server Consolidation - A Guide for IT Managers. http://www.redbooks.ibm.com, October 1999.Google Scholar
- John Mehnert-Spahn. Container Checkpointing. http://www.kerrighed.org/docs/KerrighedSummit07/JM-Container_Checkpointing.pdf, 2007.Google Scholar
- Paul B. Menage. Adding Generic Process Containers to the Linux Kernel. Proceedings of the Ottawa Linux Symposium, 2007.Google Scholar
- Aravind Menon, Alan L. Cox, and Willy Zwaenepoel. Optimizing Network Virtualization in Xen. http://www.usenix.org/events/usenix06/tech/menon.html, 2006. Google ScholarDigital Library
- Aravind Menon, Jose Renato Santos, Yoshio Turner, G. (John) Janakiraman, and Willy Zwaenepoel. Diagnosing Performance Overheads in the Xen Virtual Machine Environment. http://www.usenix.org/events/vee05/full_papers/p13-menon.pdf, 2005. Google ScholarDigital Library
- Rob Pike, Dave Presotto, Ken Thompson, Howard Trickey, and Phil Winterbottom. The Use of Name Spaces in Plan 9. Operating Systems Review, 1992. Google ScholarDigital Library
- Shaya Potter, Jason Nieh, and Matt Selsky. Secure Isolation of Untrusted Legacy Applications. Usenix LISA, 2007. Google ScholarDigital Library
- Daniel Price and Andrew Tucker. Solaris Zones: Operating System Support for Consolidating Commercial Workloads. Usenix LISA, 2004. Google ScholarDigital Library
- Rusty Russell. Lguest: The Simple x86 Hypervisor. http://lguest.ozlabs.org/, 2007.Google Scholar
- Casey Schauer. The Simplified Mandatory Access Control Kernel. http://linux.conf.au/programme/detail?TalkID=92, 2008.Google Scholar
- Brian K. Schmidt. Supporting Ubiquitous Computing with Stateless Consoles and Computation Caches. http://www-suif.stanford.edu/~bks/publications/thesis.pdf, August 2000.Google Scholar
- Stephen Soltesz, Herbert Potzl, Marc Fiuczynski, Andy Bavier, and Larry Peterson. Container-based Operating System Virtualization: A Scalable, High-Performance Alternative to Hypervisors. ACM SIGOPS/EuroSys European Conference on Computer Systems, pages 275--287, 2007. Google ScholarDigital Library
- Clifford Spinac. Dynamic logical partitioning for Linux on POWER. http://www-128.ibm.com/developerworks/systems/library/es-dynamic/, 2005.Google Scholar
- Richard Stevens. Advanced Programming in the UNIX Environment. Addison-Wesley, 1992. Google ScholarDigital Library
- Richard Stevens. TCP/IP Illustrated, Volume 1. Addison-Wesley, Indianapolis, 2001.Google Scholar
- Jeremy Sugarman, Ganesh Venkitachalam, and Beng-Hong Lim. Virtualizing I/O Devices on VMWare Workstation's Hosted Virtual Machine Monitor. Usenix Annual Technical Conference, 2001. Google ScholarDigital Library
- SWSoft. OpenVZ User's Guide. http://download.openvz.org/doc/OpenVZ-Users-Guide.pdf, 2005.Google Scholar
- Miklos Szeredi. Mount Ownership and Unprivileged Mount Syscall. http://lwn.net/Articles/273729/, 2008.Google Scholar
- Kerrighed team. Kerrighed. http://www.kerrighed.org/wiki/index.php/Main_Page, 2008.Google Scholar
- Bill Tuthill, Karen Johnson, and Terry Schultz. IRIX Checkpoint and Restart Operation Guide. SGI Technical Publications, 2003.Google Scholar
- Al Viro. {RFC} Shared Subtrees. http://lwn.net/Articles/119232/, 2005.Google Scholar
- Victor C. Zandy. ckpt - Process Checkpoint Library. http://pages.cs.wisc.edu/~zandy/ckpt/README.Google Scholar
Index Terms
- Virtual servers and checkpoint/restart in mainstream Linux
Recommendations
Research of SoftMan Migration Based on Linux Checkpoint
ICNC '09: Proceedings of the 2009 Fifth International Conference on Natural Computation - Volume 03SoftMan is a software artificial life and migration is one of its attributes. Through analyzing the format and load process of ELF file, checkpoint mechanism of Linux is made use of in this paper and designs the algorithm which integrates static ...
Optimize Performance of Virtual Machine Checkpointing via Memory Exclusion
CHINAGRID '09: Proceedings of the 2009 Fourth ChinaGrid Annual ConferenceVirtual Machine (VM) level checkpoints bring several advantages which process-level checkpoint implementation can hardly provide: compatibility, transparence, flexibility, and simplicity. However, the size of VM-level checkpoint may be very large and ...
Comments