Chapter 2: Operating-System Structures. Operating System Concepts 8th Edition,

Similar documents
Operating System Structures

COS 318: Operating Systems. Virtual Machine Monitors

Virtualization: Concepts, Applications, and Performance Modeling

IOS110. Virtualization 5/27/2014 1

System Structures. Services Interface Structure

x86 ISA Modifications to support Virtual Machines

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself

Operating Systems OS Architecture Models

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh

kvm: Kernel-based Virtual Machine for Linux

Virtualization for Cloud Computing

Virtualization. Types of Interfaces

A Project Summary: VMware ESX Server to Facilitate: Infrastructure Management Services Server Consolidation Storage & Testing with Production Servers

Assignment 5: Adding and testing a new system call to Linux kernel

Virtualization. Pradipta De

CPS221 Lecture: Operating System Structure; Virtual Machines

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtualization. Michael Tsai 2015/06/08

Virtual Machines.

The XenServer Product Family:

A Survey on Virtual Machine Security

Example of Standard API

Chapter 3: Operating-System Structures. Common System Components

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Enabling Technologies for Distributed and Cloud Computing

Virtualization. Dr. Yingwu Zhu

COS 318: Operating Systems. Virtual Machine Monitors

managing the risks of virtualization

Implementing Security on virtualized network storage environment

nanohub.org An Overview of Virtualization Techniques

Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader

Virtualization Technology (or how my Windows computer gave birth to a bunch of Linux computers)

Virtualization. Jukka K. Nurminen

Network Virtualization Tools in Linux PRESENTED BY: QUAMAR NIYAZ & AHMAD JAVAID

Operating System Components

Virtualization and the U2 Databases

Intro to Virtualization

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition

Server and Storage Virtualization. Virtualization. Overview. 5 Reasons to Virtualize

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

Full and Para Virtualization

Best Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines

COS 318: Operating Systems

Programming for GCSE Topic H: Operating Systems

Virtualization. Jia Rao Assistant Professor in CS

Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009

Introduction to Virtual Machines

Virtualization Technologies (ENCS 691K Chapter 3)

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

Enabling Technologies for Distributed Computing

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

What is virtualization

Virtual Machines. Virtualization

Virtualization Technology. Zhiming Shen

Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool

TOP TEN CONSIDERATIONS

Chapter 2 System Structures

SUSE Linux Enterprise 10 SP2: Virtualization Technology Support

Server and Storage Virtualization

VMware Server 2.0 Essentials. Virtualization Deployment and Management

Compromise-as-a-Service

Sun TM xvm Hypervisor

Comparing Free Virtualization Products

International Journal of Advancements in Research & Technology, Volume 1, Issue6, November ISSN

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software

Arwed Tschoeke, Systems Architect IBM Systems and Technology Group

The Xen of Virtualization

Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones May 2011

Virtualization: an old concept in a new approach

Server Virtualization: The Essentials

Installing & Using KVM with Virtual Machine Manager COSC 495

Accessing RCS IBM Console in Windows Using Linux Virtual Machine

Virtualization. Introduction to Virtualization Virtual Appliances Benefits to Virtualization Example Virtualization Products

Virtual Servers. Virtual machines. Virtualization. Design of IBM s VM. Virtual machine systems can give everyone the OS (and hardware) that they want.

Overview of Operating Systems Instructor: Dr. Tongping Liu

Virtualization Technologies

Virtual Desktop Infrastructure in

Hyper-V R2: What's New?

Data Centers and Cloud Computing

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Deputy Secretary for Information Technology Date Issued: November 20, 2009 Date Revised: December 20, Revision History Description:

AC : TEACHING WEB DEPLOYMENT WITH OS-VIRTUALIZATION

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration

Virtual machines and operating systems

The Art of Virtualization with Free Software

Kernel Types System Calls. Operating Systems. Autumn 2013 CS4023

Distributed Systems. Virtualization. Paul Krzyzanowski

KVM: A Hypervisor for All Seasons. Avi Kivity avi@qumranet.com

Configuring and Managing a Private Cloud with Enterprise Manager 12c

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

CS3600 SYSTEMS AND NETWORKS

Jukka Ylitalo Tik TKK, April 24, 2006

Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment

Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors

Networking for Caribbean Development

Transcription:

Chapter 2: Operating-System Structures,

Administrivia Read Chapter 3. Kernel assignment to complete by start of class Friday: Clean kernel source: cd linux 2.6.27.1; make mrproper Import kernel source into your own repository: svn import https://merlin.goucher.edu/svn/kelliher/linux 2.6.27.1 (Replace my username with YOURS) Remove unversioned kernel source: cd..; rm rf linux 2.6.27.1 2.2

Administrivia, contd. Checkout versioned kernel source: svn co https://merlin.goucher.edu/svn/kelliher/linux 2.6.27.1 Confirm that all is ok: cd linux 2.6.27.1; svn status should execute quietly. Read Programming Project 2.8 starting on pg. 93. Read http://www.linuxchix.org/content/courses/kernel_hacking/lesson5. What kernel file should actually be modified? 2.3

Outline Virtual machine examples. Adding a syscall to Linux. 2.4

Virtual Machines A virtual machine takes the layered approach to its logical conclusion. It treats hardware and the operating system kernel as though they were all hardware A virtual machine provides an interface identical to the underlying bare hardware The operating system host creates the illusion that a process has its own processor and (virtual memory) Each guest provided with a (virtual) copy of underlying computer 2.5

Virtual Machines History and Benefits First appeared commercially in IBM mainframes in 1972 Fundamentally, multiple execution environments (different operating systems) can share the same hardware Protect from each other Some sharing of file can be permitted, controlled Commutate with each other, other physical systems via networking Useful for development, testing Consolidation of many low resource use systems onto fewer busier systems Open Virtual Machine Format, standard format of virtual machines, allows a VM to run within many different virtual machine (host) platforms 2.6

Virtual Machines (Cont) Non virtual Machine Virtual Machine (a) Nonvirtual machine (b) virtual machine 2.7

Para-virtualization Presents guest with system similar but not identical to hardware Guest must be modified to run on paravirtualized hardware Guest can be an OS, or in the case of Solaris 10 applications running in containers 2.8

Solaris 10 with Two Containers 2.9

VMware Architecture 2.10

The Java Virtual Machine 2.11

Operating-System Debugging Debugging is finding and fixing errors, or bugs OSes generate log files containing error information Failure of an application can generate core dump file capturing memory of the process Operating system failure can generate crash dump file containing kernel memory printk() : 2.12

Adding a Syscall to Linux Three main elements: Assigning a number to the syscall, making it accessible from user space Adding it to the kernel syscall table, allowing the kernel to call the syscall Writing the syscall and adding it to the kernel. 2.13

Adding a Syscall to Linux Syscall path: 2.14

Syscall Parameter Passing Parameters passed in registers: _syscall1( long, diffjiffies, long, ujiffies ); printf( "difference is %lx\n", diffjiffies(jifs) ); Parameters passed by reference: int access_ok( type, address, size ); unsigned long copy_from_user( void *to, const void user *from, unsigned long n ); unsigned long copy_to_user( void *to, const void user *from, unsigned long n ); 2.15

Additional Background: http://www.ibm.com/developerworks/library/l system calls/ 2.16

End of Chapter 2,