LoRe: Supporting Non-deterministic Events Logging and Replay for KVM Virtual Machines

被引:4
作者
Li, Jianxin [1 ,2 ]
Si, Shouyu [2 ]
Li, Bo [1 ,2 ]
Cui, Lei [2 ]
Zheng, Jingsheng [2 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[2] Beihang Univ, Sch Comp Sci & Engn, Beijing 100191, Peoples R China
来源
2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC) | 2013年
关键词
Cloud Computing; Virtualization; KVM; Logging and Replay; Non-deterministic Event;
D O I
10.1109/HPCC.and.EUC.2013.70
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing brings a loose-coupled resources integration paradigm with virtualized, elastic and cost-efficient resource management capabilities. Virtualization-based logging and replay technologies give users the ability to record the executions of the whole virtual machines and recover them at any time in a peer to peer mode, and it has become an important approach to analyze the system vulnerability, debug the system execution, or recover a failed system. In this paper, we design a logging and replay system named LoRe in KVM (Kernel-based Virtual Machine) which is a widely-used full virtualization solution. In LoRe, the logging of non-deterministic events is achieved based on the Virtual Machine Control Structure (VMCS), and a kernel notification chain is designed to reduce the time consumption of the branches counter matching procedure in the replay process. Moreover, to use less cache and reduce the overhead of log transmission, a reusable circular buffer queue is designed and IOCTL is used for the data transmission. We implemented LoRe in kvm-kmod-2.6.32, and experimental study show that the overhead of LoRe is lower than 8%, and only a small storage space is used.
引用
收藏
页码:442 / 449
页数:8
相关论文
共 20 条
  • [1] [Anonymous], INT 64 IA 32 ARCH SO
  • [2] [Anonymous], 2003, P INT C ADV INFR EL
  • [3] Bressoud T. C., 1995, Operating Systems Review, V29, P1, DOI 10.1145/224057.224058
  • [4] VMScatter: Migrate Virtual Machines to Many Hosts
    Cui, Lei
    Li, Jianxin
    Li, Bo
    Huai, Jinpeng
    Hu, Chunming
    Wo, Tianyu
    Al-Aqrabi, Hussain
    Liu, Lu
    [J]. ACM SIGPLAN NOTICES, 2013, 48 (07) : 63 - 72
  • [5] de Oliveira DanielaA. S., 2006, "Proceedings of the 1st workshop on Architectural and system support for improving software dependability," ASID '06, P66
  • [6] Deshane T., 2008, Quantitative comparison of xen and KVM, P1
  • [7] Dunlap GW, 2008, VEE'08: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON VIRTUAL EXECUTION ENVIRONMENTS, P121
  • [8] ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
    Dunlap, GW
    King, ST
    Cinar, S
    Basrai, MA
    Chen, PM
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, : 211 - 224
  • [9] Fox A., 2009, Above the clouds: A Berkeley view of cloud computing, P28
  • [10] Intel Open Source Technology Center, 2009, SYST VIRT PRINC IMPL