Access the full text.
Sign up today, get DeepDyve free for 14 days.
R. Goldberg (1974)
Survey of virtual machine researchComputer, 7
Peter Loscocco, Stephen Smalley
Proceedings of the Freenix Track: 2001 Usenix Annual Technical Conference Integrating Flexible Support for Security Policies into the Linux Operating System
(2008)
Mount Ownership and Unprivileged Mount Syscall. http://lwn.net/Articles
(2006)
Serge Hallyn, and Hubertus Franke. Making applications mobile using containers
Oren Laadan, Jason Nieh (2007)
Transparent Checkpoint-Restart of Multiple Processes on Commodity Operating Systems
A. Barak, O. La'adan (1998)
The MOSIX multicomputer operating system for high performance cluster computingFuture Gener. Comput. Syst., 13
(1964)
Customer Engineering Announcement: IBM System/360
Aravind Menon, J. Santos, Yoshio Turner, John Janakiraman, W. Zwaenepoel (2005)
Diagnosing performance overheads in the xen virtual machine environment
Fabrice Bellard (2005)
QEMU, a Fast and Portable Dynamic Translator
Craig Knoblock (1992)
Advanced Programming in the UNIX Environment
ckpt -Process Checkpoint Library
(2004)
BSD Jail Functionality for Linux. http://sourceforge.net/projects/linuxjail
(2006)
Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers
(2008)
cgroups: Implement Device Whitelist LSM. http://lwn.net/Articles
(2007)
Container Checkpointing
S. Potter, Jason Nieh, Matt Selsky (2007)
Secure Isolation of Untrusted Legacy Applications
D. Price, A. Tucker (2004)
Solaris Zones: Operating System Support for Consolidating Commercial Workloads
F. Douglis, J. Ousterhout (1991)
Transparent process migration: Design alternatives and the sprite implementationSoftware: Practice and Experience, 21
(2007)
Applying Mount Namespaces. http://www.ibm.com/developerworks/linux/ library/l-mount-namespaces.html
B. Schmidt (2000)
Supporting ubiquitous computing with stateless consoles and computation caches
Avi Kivity, Anthony Liguori (2007)
kvm : the Linux Virtual Machine Monitor
Paul Barham, Boris Dragovic, K. Fraser, S. Hand, T. Harris, Alex Ho, R. Neugebauer, I. Pratt, A. Warfield (2003)
Xen and the art of virtualization
Meenali Rungta (2006)
Transparent Process Migration : Design Alternatives and the Sprite Implementation
P. Kamp, R. Watson (2000)
Jails: confining the omnipotent root
(2005)
OpenVZ User's Guide. http: //download.openvz.org/doc/OpenVZ-Users-Guide.pdf
Aravind Menon, A. Cox, W. Zwaenepoel (2006)
Optimizing network virtualization in Xen
(1999)
Martin Soellig, and Ampie Vos. S/390 Server Consolidation -A Guide for IT Managers
Workload Partitions Manager for AIX. http://www-03.ibm.com/systems/p/os/aix/sysmgmt
Condor: Current Limitations
(2007)
PID Namespaces in the 2.6.24 Kernel. http://lwn.net/Articles
J. Duell, Paul Hargrove, Eric Roman (2002)
Requirements for Linux Checkpoint/RestartLawrence Berkeley National Laboratory
J. Sugerman, G. Venkitachalam, B. Lim (2001)
Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor
(2002)
Cray X1 System Overview -S-2346-23. Cray software distribution center
J. Duell (2005)
The design and implementation of Berkeley Lab's linux checkpoint/restartLawrence Berkeley National Laboratory
(2005)
Dynamic logical partitioning for Linux on POWER. http://www-128.ibm.com/developerworks/ systems/library/es-dynamic
C. Landau (1992)
The checkpoint mechanism in KeyKOS[1992] Proceedings of the Second International Workshop on Object Orientation in Operating Systems
Stephen Soltesz, Herbert Pötzl, M. Fiuczynski, A. Bavier, L. Peterson (2007)
Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors
(2007)
Lguest: The Simple x86 Hypervisor
P. Menage (2010)
Adding Generic Process Containers to the Linux Kernel
M. Litzkow, T. Tannenbaum, J. Basney, M. Livny (1997)
Checkpoint and Migration of UNIX Processes in the Condor Distributed Processing System
(2003)
IRIX Checkpoint and Restart Operation Guide
(2008)
The Simplified Mandatory Access Control Kernel. http://linux.conf.au/programme/detail?TalkID=92
R. Pike, D. Presotto, K. Thompson, H. Trickey, P. Winterbottom (1993)
The use of name spaces in Plan 9ACM SIGOPS Oper. Syst. Rev., 27
B. Ford, Mike Hibler, Jay Lepreau, Patrick Tullmann, Godmar Back, S. Clawson (1996)
Microkernels meet recursive virtual machines
Virtual Servers and Checkpoint/Restart in Mainstream Linux Sukadev Bhattiprolu sukadev@us.ibm.com IBM Eric W. Biederman ebiederm@xmission.com Daniel Lezcano dlezcano@fr.ibm.com IBM Arastra Serge Hallyn serue@us.ibm.com IBM ABSTRACT Virtual private servers and application checkpoint and restart are two advanced operating system features which place different but related requirements on the way kernel-provided resources are accessed by userspace. In Linux, kernel resources, such as process IDs and SYSV shared messages, have traditionally been identi ed using global tables. Since 2005, these tables have gradually been transformed into perprocess namespaces in order to support both resource availability on application restart and virtual private server functionality. Due to inherent di erences in the resources themselves, the semantics of namespace cloning di er for many of the resources. This paper describes the existing and proposed namespaces as well as their uses. are two additional desirable features which motivated the authors. The rst feature is the implementation of virtual private servers (VPS). The second is application checkpoint and restart (ACR) functionality. This paper is the rst to present recent work in the Linux kernel which builds an infrastructure for supporting VPS and ACR. The remainder of this introduction will present a general overview of VPS and
ACM SIGOPS Operating Systems Review – Association for Computing Machinery
Published: Jul 1, 2008
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.