Virtuozzo Hybrid Server 7

Total Page:16

File Type:pdf, Size:1020Kb

Virtuozzo Hybrid Server 7 Virtuozzo Hybrid Server 7 User's Guide September 30, 2021 Virtuozzo International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 https://virtuozzo.com Copyright ©2016-2021 Virtuozzo International GmbH. All rights reserved. This product is protected by United States and international copyright laws. The product’s underlying technology, patents, and trademarks are listed at . Microsoft, Windows, Windows Server, Windows NT, Windows Vista, and MS-DOS are registered trademarks of Microsoft Corporation. Apple, Mac, the Mac logo, Mac OS, iPad, iPhone, iPod touch, FaceTime HD camera and iSight are trademarks of Apple Inc., registered in the US and other countries. Linux is a registered trademark of Linus Torvalds. All other marks and names mentioned herein may be trademarks of their respective owners. Contents 1. Learning the Basics ................................................ 1 1.1 Virtuozzo Hybrid Server Overview .................................... 1 1.2 Differences between Virtuozzo Hybrid Server and OpenVZ ..................... 2 1.3 OS Virtualization Layer ........................................... 2 1.3.1 Basics of OS Virtualization .................................... 2 1.3.2 Virtuozzo Containers ....................................... 3 1.3.2.1 Virtuozzo Container Hardware ........................... 5 1.3.3 Memory and IOPS Deduplication ................................ 5 1.3.4 Templates ............................................. 6 1.4 Hardware Virtualization Layer ...................................... 7 1.4.1 Hardware Virtualization Basics ................................. 7 1.4.2 Virtuozzo Virtual Machines ................................... 8 1.4.2.1 Intel Virtualization Technology Support ...................... 8 1.4.3 Virtual Machine Hardware .................................... 8 1.4.4 Virtual Machine Files ....................................... 10 1.4.5 Support of Virtual and Real Media ............................... 10 1.4.5.1 Supported Types of Hard Disks .......................... 11 1.4.5.2 Virtual Hard Disks .................................. 11 1.4.5.3 CD/DVD Disc Images ................................. 11 1.5 Virtuozzo Hybrid Server Configuration ................................. 11 1.6 Resource Management .......................................... 11 1.7 Understanding Licensing ......................................... 12 1.8 Physical Server Availability Considerations ............................... 12 2. Managing Virtual Machines and Containers ................................ 14 2.1 Creating Virtual Machines and Containers ............................... 14 2.1.1 Choosing OS EZ Templates for Containers .......................... 14 i 2.1.1.1 Listing OS EZ Templates ............................... 14 2.1.1.2 Installing and Caching OS EZ Templates ..................... 15 2.1.2 Creating Containers ....................................... 16 2.1.3 Creating Virtual Machines .................................... 17 2.1.4 Supported Guest Operating Systems ............................. 17 2.1.4.1 Virtual Machines ................................... 18 2.1.4.2 Containers ....................................... 19 2.2 Performing Initial Configuration of Virtual Machines and Containers ............... 19 2.2.1 Using cloud-init for Virtual Machine Guest Initialization .................. 20 2.2.2 Installing Virtuozzo Guest Tools ................................ 20 2.2.3 Configuring Network Settings .................................. 23 2.2.4 Setting Passwords for Virtual Machines and Containers .................. 23 2.2.5 Setting Startup Parameters ................................... 24 2.3 Starting, Stopping, Restarting, and Querying Status of Virtual Machines and Containers .... 25 2.3.1 Starting Virtual Machines and Containers ........................... 25 2.3.2 Stopping Virtual Machines and Containers .......................... 25 2.3.3 Restarting Virtual Machines and Containers ......................... 25 2.3.4 Checking Status of Virtual Machines and Containers .................... 26 2.4 Listing Virtual Machines and Containers ................................ 26 2.5 Cloning Virtual Machines and Containers ................................ 27 2.5.1 Creating Linked Clones ..................................... 28 2.5.2 Configuring Default Directories ................................. 28 2.6 Suspending Virtual Machines and Containers ............................. 29 2.7 Running Commands in Virtual Machines and Containers ...................... 29 2.8 Deleting Virtual Machines and Containers ............................... 30 2.9 Viewing Detailed Information about Virtual Machines and Containers ............... 31 2.10 Managing Virtual Machine and Container Backups .......................... 32 2.10.1 Creating Virtual Machine and Container Backups ...................... 32 2.10.1.1 Using a Temporary Directory for VM Backups . 34 2.10.2 Listing Virtual Machine and Container Backups ....................... 34 2.10.3 Restoring Virtual Machines and Containers from Backups ................. 36 2.10.4 Deleting Virtual Machine and Container Backups ...................... 38 2.10.5 Backing Up Entire Servers .................................... 39 2.10.6 Attaching Backups to Virtual Machines and Containers ................... 39 2.10.6.1 Attaching Backups to Linux Virtual Machines . 40 ii 2.10.6.2 Attaching Backups to Windows Virtual Machines . 41 2.10.6.3 Attaching Backups to Linux Containers ...................... 42 2.10.7 Detaching Backups from Virtual Machines and Containers ................ 43 2.10.8 Best Practices for Handling Page Cache When Working with Backups .......... 43 2.10.8.1 Performing Backups from the Page Cache Angle . 43 2.10.8.2 Limiting Memory Pressure from Node Processes . 45 2.11 Managing Templates ............................................ 47 2.11.1 Creating Templates ........................................ 47 2.11.2 Listing Templates ......................................... 48 2.11.3 Deploying Templates ....................................... 48 2.11.4 Migrating Templates ....................................... 49 2.11.5 Storing Templates on Virtuozzo Storage ........................... 49 2.12 Managing Snapshots ............................................ 50 2.12.1 Creating Snapshots ........................................ 50 2.12.1.1 Creating Virtual Machine Snapshots ........................ 51 2.12.1.2 Creating Container Snapshots ........................... 51 2.12.1.3 Snapshot Branching ................................. 52 2.12.1.4 Restrictions and Recommendations ........................ 52 2.12.2 Listing Snapshots ......................................... 52 2.12.3 Reverting to Snapshots ..................................... 54 2.12.4 Deleting Snapshots ........................................ 54 2.13 Migrating Virtual Machines and Containers ............................... 54 2.13.1 Offline Migration of Virtual Machines and Containers ................... 55 2.13.2 Live Migration of Virtual Machines and Containers ..................... 56 2.13.3 Migrating Virtual Machines and Containers from Virtuozzo 6 to Virtuozzo Hybrid Server 7 .............................................. 58 2.14 Performing Container-Specific Operations ............................... 60 2.14.1 Reinstalling Containers ..................................... 60 2.14.1.1 Customizing Container Reinstallation ....................... 60 2.14.2 Repairing Containers ....................................... 62 2.14.3 Enabling VPN for Containers .................................. 63 2.14.4 Setting Up NFS Server in Containers .............................. 63 2.14.5 Mounting NFS Shares on Container Start ........................... 64 2.14.6 Managing Container Virtual Disks ............................... 64 2.14.6.1 Adding Virtual Disks to Containers ......................... 64 iii 2.14.6.2 Configuring Container Virtual Disks ........................ 67 2.14.6.3 Deleting Virtual Disks from Containers ...................... 67 2.14.7 Restarting Containers ...................................... 68 2.14.8 Creating SimFS-based Containers ............................... 68 2.14.9 Bind-Mounting Host Directories Inside Containers ..................... 68 2.15 Performing Virtual Machine-Specific Operations ........................... 69 2.15.1 Pausing Virtual Machines .................................... 70 2.15.2 Managing Virtual Machine Devices ............................... 70 2.15.2.1 Adding New Devices ................................. 71 2.15.2.2 Initializing Newly Added Disks ........................... 72 2.15.2.3 Configuring Virtual Devices ............................. 75 2.15.2.4 Deleting Devices ................................... 76 2.15.3 Making Screenshots ....................................... 77 2.15.4 Assigning Host Devices to Virtual Machines ......................... 78 2.15.4.1 Assigning USB Devices to Virtual Machines .................... 78 2.15.4.2 Assigning PCI Devices to Virtual Machines .................... 80 2.15.4.3 Using PCI I/O Virtualization ............................. 81 2.15.5 Configuring IP Address Ranges for Host-Only Networks .................. 82 2.15.6 Configuring Virtual Machine Crash Mode ........................... 83 2.15.7 Enabling Secure Boot for Virtual Machines .......................... 83 3. Managing Resources ............................................... 86 3.1 Managing CPU Resources ........................................
Recommended publications
  • FIPS 140-2 Non-Proprietary Security Policy
    Kernel Crypto API Cryptographic Module version 1.0 FIPS 140-2 Non-Proprietary Security Policy Version 1.3 Last update: 2020-03-02 Prepared by: atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 www.atsec.com © 2020 Canonical Ltd. / atsec information security This document can be reproduced and distributed only whole and intact, including this copyright notice. Kernel Crypto API Cryptographic Module FIPS 140-2 Non-Proprietary Security Policy Table of Contents 1. Cryptographic Module Specification ..................................................................................................... 5 1.1. Module Overview ..................................................................................................................................... 5 1.2. Modes of Operation ................................................................................................................................. 9 2. Cryptographic Module Ports and Interfaces ........................................................................................ 10 3. Roles, Services and Authentication ..................................................................................................... 11 3.1. Roles .......................................................................................................................................................11 3.2. Services ...................................................................................................................................................11
    [Show full text]
  • Red Hat Enterprise Linux 7 7.1 Release Notes
    Red Hat Enterprise Linux 7 7.1 Release Notes Release Notes for Red Hat Enterprise Linux 7 Red Hat Customer Content Services Red Hat Enterprise Linux 7 7.1 Release Notes Release Notes for Red Hat Enterprise Linux 7 Red Hat Customer Content Services Legal Notice Copyright © 2015 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • CIS Debian Linux 7 Benchmark V1.0.0 - 12-31-2015
    CIS Debian Linux 7 Benchmark v1.0.0 - 12-31-2015 http://benchmarks.cisecurity.org The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics, suggestions, and recommendations (the “SB Products”) as a public service to Internet users worldwide. Downloading or using SB Products in any way signifies and confirms your acceptance of and your binding agreement to these CIS Security Benchmarks Terms of Use. CIS SECURITY BENCHMARKS TERMS OF USE BOTH CIS SECURITY BENCHMARKS DIVISION MEMBERS AND NON-MEMBERS MAY: Download, install, and use each of the SB Products on a single computer, and/or Print one or more copies of any SB Product that is in a .txt, .pdf, .doc, .mcw, or .rtf format, but only if each such copy is printed in its entirety and is kept intact, including without limitation the text of these CIS Security Benchmarks Terms of Use. UNDER THE FOLLOWING TERMS AND CONDITIONS: SB Products Provided As Is. CIS is providing the SB Products “as is” and “as available” without: (1) any representations, warranties, or covenants of any kind whatsoever (including the absence of any warranty regarding: (a) the effect or lack of effect of any SB Product on the operation or the security of any network, system, software, hardware, or any component of any of them, and (b) the accuracy, utility, reliability, timeliness, or completeness of any SB Product); or (2) the responsibility to make or notify you of any corrections, updates, upgrades, or fixes. Intellectual Property and Rights Reserved. You are not acquiring any title or ownership rights in or to any SB Product, and full title and all ownership rights to the SB Products remain the exclusive property of CIS.
    [Show full text]
  • Security Assurance Requirements for Linux Application Container Deployments
    NISTIR 8176 Security Assurance Requirements for Linux Application Container Deployments Ramaswamy Chandramouli This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8176 NISTIR 8176 Security Assurance Requirements for Linux Application Container Deployments Ramaswamy Chandramouli Computer Security Division Information Technology Laboratory This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8176 October 2017 U.S. Department of Commerce Wilbur L. Ross, Jr., Secretary National Institute of Standards and Technology Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology NISTIR 8176 SECURITY ASSURANCE FOR LINUX CONTAINERS National Institute of Standards and Technology Internal Report 8176 37 pages (October 2017) This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8176 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. This p There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by federal agencies even before the completion of such companion publications. Thus, until each ublication is available free of charge from: http publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new publications by NIST.
    [Show full text]
  • SNMP Trap - Firewall Rules
    SNMP Trap - Firewall Rules Article Number: 87 | Rating: 1/5 from 1 votes | Last Updated: Wed, Jan 13, 2021 at 4:42 PM Fir e wall Rule s These steps explain how to check if the Operating System (OS) of the Nagios server has firewall rules enabled to allow inbound SNMP Trap UDP port 162 traffic. The different supported OS's have different firewall commands which are explained as follows. You will need to establish an SSH session to the Nagios server that is receiving SNMP Traps. RHEL 7/8 | C e nt O S 7/8 | O r ac le Linux 7/8 First check the status of the firewall: systemctl status firewalld.service IF the firewall is running , it should product output like: ● firewalld.service - firewalld - dynamic firewall daemon Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled; vendor preset: enabled) Active: active (running) since Tue 2018-11-20 10:05:15 AEDT; 1 weeks 0 days ago Docs: man:firewalld(1) Main PID: 647 (firewalld) CGroup: /system.slice/firewalld.service └─647 /usr/bin/python -Es /usr/sbin/firewalld --nofork --nopid IF the firewall is NO T running, it will produce this output: ● firewalld.service - firewalld - dynamic firewall daemon Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled; vendor preset: enabled) Active: inactive (dead) since Tue 2018-11-27 14:11:34 AEDT; 965ms ago Docs: man:firewalld(1) Main PID: 647 (code=exited, status=0/SUCCESS) If the firewall is NOT running, this means that inbound traffic is allowed. To ENABLE the firewall on b o o t and to s ta rt it, execute the following commands: systemctl
    [Show full text]
  • A Letter to the FCC [PDF]
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of ) ) Amendment of Part 0, 1, 2, 15 and 18 of the ) ET Docket No. 15­170 Commission’s Rules regarding Authorization ) Of Radio frequency Equipment ) ) Request for the Allowance of Optional ) RM­11673 Electronic Labeling for Wireless Devices ) Summary The rules laid out in ET Docket No. 15­170 should not go into effect as written. They would cause more harm than good and risk a significant overreach of the Commission’s authority. Specifically, the rules would limit the ability to upgrade or replace firmware in commercial, off­the­shelf home or small­business routers. This would damage the compliance, security, reliability and functionality of home and business networks. It would also restrict innovation and research into new networking technologies. We present an alternate proposal that better meets the goals of the FCC, not only ensuring the desired operation of the RF portion of a Wi­Fi router within the mandated parameters, but also assisting in the FCC’s broader goals of increasing consumer choice, fostering competition, protecting infrastructure, and increasing resiliency to communication disruptions. If the Commission does not intend to prohibit the upgrade or replacement of firmware in Wi­Fi ​ ​ devices, the undersigned would welcome a clear statement of that intent. Introduction We recommend the FCC pursue an alternative path to ensuring Radio Frequency (RF) compliance from Wi­Fi equipment. We understand there are significant concerns regarding existing users of the Wi­Fi ​ spectrum, and a desire to avoid uncontrolled change. However, we most strenuously advise against prohibiting changes to firmware of devices containing radio components, and furthermore advise against allowing non­updatable devices into the field.
    [Show full text]
  • Migrating-From-Rhn-Classic.Pdf
    Red Hat Subscription Management All Subscription Docs Migrating from RHN Classic to migrate from older Red Hat Network Classic (hosted) to updated subscription management Edition 4 Last Updated: 2018-05-01 Red Hat Subscription Management All Subscription Docs Migrating from RHN Classic to migrate from older Red Hat Network Classic (hosted) to updated subscription management Edition 4 Red Hat Subscription Management Documentation Team [email protected] Legal Notice Copyright © 2016 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent.
    [Show full text]
  • The Xen Port of Kexec / Kdump a Short Introduction and Status Report
    The Xen Port of Kexec / Kdump A short introduction and status report Magnus Damm Simon Horman VA Linux Systems Japan K.K. www.valinux.co.jp/en/ Xen Summit, September 2006 Magnus Damm ([email protected]) Kexec / Kdump Xen Summit, September 2006 1 / 17 Outline Introduction to Kexec What is Kexec? Kexec Examples Kexec Overview Introduction to Kdump What is Kdump? Kdump Kernels The Crash Utility Xen Porting Effort Kexec under Xen Kdump under Xen The Dumpread Tool Partial Dumps Current Status Magnus Damm ([email protected]) Kexec / Kdump Xen Summit, September 2006 2 / 17 Introduction to Kexec Outline Introduction to Kexec What is Kexec? Kexec Examples Kexec Overview Introduction to Kdump What is Kdump? Kdump Kernels The Crash Utility Xen Porting Effort Kexec under Xen Kdump under Xen The Dumpread Tool Partial Dumps Current Status Magnus Damm ([email protected]) Kexec / Kdump Xen Summit, September 2006 3 / 17 Kexec allows you to reboot from Linux into any kernel. as long as the new kernel doesn’t depend on the BIOS for setup. Introduction to Kexec What is Kexec? What is Kexec? “kexec is a system call that implements the ability to shutdown your current kernel, and to start another kernel. It is like a reboot but it is indepedent of the system firmware...” Configuration help text in Linux-2.6.17 Magnus Damm ([email protected]) Kexec / Kdump Xen Summit, September 2006 4 / 17 . as long as the new kernel doesn’t depend on the BIOS for setup. Introduction to Kexec What is Kexec? What is Kexec? “kexec is a system call that implements the ability to shutdown your current kernel, and to start another kernel.
    [Show full text]
  • Netfilter's Connection Tracking System
    FILTERING POLICIES BASED UNIQUELY on packet header information are obsolete. PABLO NEIRA AYUSO These days, stateful firewalls provide advanced mechanisms to let sysadmins Netfilter’s and security experts define more intelli- gent policies. This article describes the connection implementation details of the connection tracking system tracking system provided by the Netfilter project and also presents the required Pablo Neira Ayuso has an M.S. in computer science background to understand it, such as an and has worked for several companies in the IT secu- rity industry, with a focus on open source solutions. understanding of the Netfilter framework. Nowadays he is a full-time teacher and researcher at the University of Seville. This article will be the perfect complement to understanding the subsystem that [email protected] enables the stateful firewall available in any recent Linux kernel. The Netfilter Framework The Netfilter project was founded by Paul “Rusty” Russell during the 2.3.x development series. At that time the existing firewalling tool for Linux had serious drawbacks that required a full rewrite. Rusty decided to start from scratch and create the Netfilter framework, which comprises a set of hooks over the Linux network protocol stack. With the hooks, you can register kernel modules that do some kind of network packet handling at different stages. Iptables, the popular firewalling tool for Linux, is commonly confused with the Netfilter framework itself. This is because iptables chains and hooks have the same names. But iptables is just a brick on top of the Netfilter framework. Fortunately, Rusty spent considerable time writ- ing documentation [1] that comes in handy for anyone willing to understand the framework, al- though at some point you will surely feel the need to get your hands dirty and look at the code to go further.
    [Show full text]
  • Managing Software with Yum
    Fedora Core 4 Managing software with yum Stuart Ellis Edited by Paul W. Frields Copyright © 2005 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. All other trademarks are the property of their respective owners. 1. Introduction ............................................................................................................................. 2 1.1. Purpose ....................................................................................................................... 2 1.2. Audience ....................................................................................................................
    [Show full text]
  • Adding Generic Process Containers to the Linux Kernel
    Adding Generic Process Containers to the Linux Kernel Paul B. Menage∗ Google, Inc. [email protected] Abstract Technically resource control and isolation are related; both prevent a process from having unrestricted access to even the standard abstraction of resources provided by the Unix kernel. For the purposes of this paper, we While Linux provides copious monitoring and control use the following defintions: options for individual processes, it has less support for applying the same operations efficiently to related Resource control is any mechanism which can do either groups of processes. This has led to multiple proposals or both of: for subtly different mechanisms for process aggregation for resource control and isolation. Even though some of these efforts could conceptually operate well together, • tracking how much of a resource is being com- merging each of them in their current states would lead sumed by a set of processes to duplication in core kernel data structures/routines. • imposing quantative limits on that consumption, ei- The Containers framework, based on the existing ther absolutely, or just in times of contention. cpusets mechanism, provides the generic process group- ing features required by the various different resource Typically resource control is visible to the processes be- controllers and other process-affecting subsystems. The ing controlled. result is to reduce the code (and kernel impact) required for such subsystems, and provide a common interface Namespace isolation1 is a mechanism which adds an with greater scope for co-operation. additional indirection or translation layer to the nam- ing/visibility of some unix resource space (such as pro- This paper looks at the challenges in meeting the needs cess ids, or network interfaces) for a specific set of pro- of all the stakeholders, which include low overhead, cesses.
    [Show full text]
  • Multicore Operating-System Support for Mixed Criticality∗
    Multicore Operating-System Support for Mixed Criticality∗ James H. Anderson, Sanjoy K. Baruah, and Bjorn¨ B. Brandenburg The University of North Carolina at Chapel Hill Abstract Different criticality levels provide different levels of assurance against failure. In current avionics designs, Ongoing research is discussed on the development of highly-critical software is kept physically separate from operating-system support for enabling mixed-criticality less-critical software. Moreover, no currently deployed air- workloads to be supported on multicore platforms. This craft uses multicore processors to host highly-critical tasks work is motivated by avionics systems in which such work- (more precisely, if multicore processors are used, and if loads occur. In the mixed-criticality workload model that is such a processor hosts highly-critical applications, then all considered, task execution costs may be determined using but one of its cores are turned off). These design decisions more-stringent methods at high criticality levels, and less- are largely driven by certification issues. For example, cer- stringent methods at low criticality levels. The main focus tifying highly-critical components becomes easier if poten- of this research effort is devising mechanisms for providing tially adverse interactions among components executing on “temporal isolation” across criticality levels: lower levels different cores through shared hardware such as caches are should not adversely “interfere” with higher levels. simply “defined” not to occur. Unfortunately, hosting an overall workload as described here clearly wastes process- ing resources. 1 Introduction In this paper, we propose operating-system infrastruc- ture that allows applications of different criticalities to be The evolution of computational frameworks for avionics co-hosted on a multicore platform.
    [Show full text]