Dark shadows: User-level guest/host linux process shadowing

Peter A Dinda, Akhil Guliani

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

The concept of a shadow process simplifies the design and implementation of virtualization services such as system call forwarding and device file-level device virtualization. A shadow process on the host mirrors a process in the guest at the level of the virtual and physical address space, terminating in the host physical addresses. Previous shadow process mechanisms have required changes to the guest and host kernels. We describe a shadow process technique that is implemented at user-level in both the guest and the host. In our technique, we refer to the host shadow process as a dark shadow as it arranges its own elements to avoid conflicting with the guest process's elements. We demonstrate the utility of dark shadows by using our implementation to create system call forwarding and device file-level device virtualization prototypes that are compact and simple.

Original languageEnglish (US)
Title of host publicationProceedings - 2017 IEEE International Conference on Cloud Engineering, IC2E 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages29-39
Number of pages11
ISBN (Electronic)9781509058174
DOIs
StatePublished - May 9 2017
Event2017 IEEE International Conference on Cloud Engineering, IC2E 2017 - Vancouver, Canada
Duration: Apr 4 2017Apr 7 2017

Publication series

NameProceedings - 2017 IEEE International Conference on Cloud Engineering, IC2E 2017

Other

Other2017 IEEE International Conference on Cloud Engineering, IC2E 2017
Country/TerritoryCanada
CityVancouver
Period4/4/174/7/17

Keywords

  • operating system
  • shadow process
  • virtualization

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Dark shadows: User-level guest/host linux process shadowing'. Together they form a unique fingerprint.

Cite this