期刊文献+

一种采用驱动隔离的宿主机可靠性方法

Improving the Reliability of Host Machine with Driver Isolation
下载PDF
导出
摘要 针对虚拟化环境下宿主机中的驱动程序故障容易造成宿主机及其虚拟机崩溃的问题,提出了一种采用驱动隔离的宿主机可靠性方法。该方法基于StyleBox架构的保护域功能,将其扩展用于复杂接口的驱动程序的隔离,包括:为驱动和内核的复杂交互接口建立包装函数,从而限定驱动程序运行在保护域中;为驱动程序提供私有内存,以保证驱动程序能够在保护域内正常运行。实验结果表明:在利用该方法修改的Linux2.6.28.10宿主机内核中,对于随机注入网卡驱动并造成内核破坏的错误,该方法可以有效检测90.63%的注入错误,并成功隔离67.5%的注入错误,防止了驱动故障传播到宿主机内核,提高了宿主机的可靠性。 An approach to improve the reliability of the host machines with driver isolation is proposed to solve the problem that the driver fault crashes the host machines and its virtual machines.The approach is based on the protection domain of the pre-developed architecture StyleBox and extends it to isolate the driver with complex interfaces.For detail,it creates wrapper functions for the complex interactive interfaces between the driver and the kernel,limits the driver running in the protection domain,and provides private memories for isolated drivers to support the driver's normal operation in the protection domain.Experimental results on a Linux2.6.28.10 host machine kernel that is modified using the proposed approach show that the approach successfully detects 90.63% of the faults,which are randomly injected to the network driver and damage the host machines kernel,and isolates 67.5% of them,and that the reliability of host machines is improved.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2013年第10期7-12,24,共7页 Journal of Xi'an Jiaotong University
基金 国家"863计(2008AA01A202 2011AA01A204) 国家科技攻关计划资助项目(2011BAH04B03)
关键词 可靠性 虚拟化 驱动隔离 宿主机 reliability virtualization driver isolation host machine
  • 相关文献

参考文献9

  • 1SWIFT M M,BERSHAD B N,LEVY H M.Improving the reliability of commodity operating systems[J].ACM Transactions on Computer Systems,2005,23(1):77-110.
  • 2LEVASSEUR J,UHLIG V,STOESS J,et al.Unmodified device driver reuse and improved system dependability via virtual machines[C]// Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation.Berkeley,CA,USA:USENIX,2004:17-30.
  • 3TAN L,CHAN E M,FARIVAR R,et al.iKernel:isolating buggy and malicious device drivers using hardware virtualization support[C]// Proceedings of the Third IEEE International Symposium on Dependable,Autonomic and Secure Computing.Piscataway,NJ,USA:IEEE,2007:134-144.
  • 4GANAPATHY V,RENZELMANN M J,BALAKRISHNAN A,et al.The design and implementation of microdrivers[J].ACM SIGOPS Operating Systems Review,2008,42(2):168-178.
  • 5WILLIANS D,REYNOLDS P,WALSH K,et al.Device driver safety through a reference validation mechanism[C]// Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation.Berkeley,CA,USA:USENIX,2008:241-254.
  • 6华保健,陈意云,李兆鹏,王志芳,葛琳,江苏苏州215123.安全语言PointerC的设计及形式证明[J].计算机学报,2008,31(4):556-564. 被引量:8
  • 7ZHOU F,CONDIT J,ANDERSON Z,et al.SafeDrive:safe and recoverable extensions using language-based techniques[C]//Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation.Berkeley,CA,USA:USENIX,2006:45-60.
  • 8CASTRO M,COSTA M,MARTIN J,et al.Fast bytegranularity software fault isolation[C]// Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles.New York,USA:ACM,2009:45-58.
  • 9ZHENG Hao,ZHANG Xinjun,WANG Endong,et al.Achieving High Reliability on Linux for K2 System[C]//Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science.Piscataway,NJ,USA:IEEE,2012:107-112.

二级参考文献21

  • 1CNCERT/CC. 2006 Annual report. Available at http:// www. cert. org. cn/articles/docs/common/2007042923284. shtml
  • 2Galen Hunt, James Larus. Singularity: Rethinking the software stack. Operating Systems Review, 2007, 41(2): 37-49
  • 3Mandelbaum Y, Walker D, Harper R. An effective theory of type refinements//Proceedings of the 8th ACM SIGPLAN International Conference on Functional Programming. Uppsala, Sweden, 2003:213-225
  • 4Xi H. Imperative programming with dependent types//Proceedings of the 15th IEEE Symposium on Logic in Computer Seienee. Washington, DC: IEEE Computer Society, 2000: 375-387
  • 5Xi H, Pfenning F, Dependent types in practical programming//Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. San Antonio, Texas, USA, 1999: 214-227
  • 6Xi H W. Applied type system (extended abstraet)//Post- Workshop Proceedings of the TYPES 2003, Lecture Notes in Computer Science 3085. Berlin: Springer-Verlag, 2004: 394-408
  • 7Smith F, Walker D, Morrisett J G. Alias types//Proceedings of the 9th European Symposium on Programming Languages and Systems. Lecture Notes in Computer Science 1782. London: Springer-Verlag, 2000:366-381
  • 8Hoare C A R. An axiomatic basis for computer programming. Communications of the ACM, 1969, 12(10): 576-580
  • 9Necula G C. Proof-carrying code//Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. Paris, France, 1997:106-119
  • 10Chen Y Y, Ge L, Hua B J, Li Z P, Liu C, Wang Z F. A pointer logic and certifying compiler. Frontiers of Computer Science in China, 2007, 1(3): 297-312

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部