WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] Truly Autonomous Migration

To: Xen-devel@xxxxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] Truly Autonomous Migration
From: Jacob Gorm Hansen <jacob@xxxxxxxx>
Date: Fri, 12 Nov 2004 01:03:06 +0100
Cc: eric@xxxxxxx, eske@xxxxxxx
Delivery-date: Fri, 12 Nov 2004 00:35:53 +0000
Envelope-to: steven.hand@xxxxxxxxxxxx
List-archive: <http://sourceforge.net/mailarchive/forum.php?forum=xen-devel>
List-help: <mailto:xen-devel-request@lists.sourceforge.net?subject=help>
List-id: List for Xen developers <xen-devel.lists.sourceforge.net>
List-post: <mailto:xen-devel@lists.sourceforge.net>
List-subscribe: <https://lists.sourceforge.net/lists/listinfo/xen-devel>, <mailto:xen-devel-request@lists.sourceforge.net?subject=subscribe>
List-unsubscribe: <https://lists.sourceforge.net/lists/listinfo/xen-devel>, <mailto:xen-devel-request@lists.sourceforge.net?subject=unsubscribe>
Sender: xen-devel-admin@xxxxxxxxxxxxxxxxxxxxx
User-agent: Mozilla Thunderbird 0.8 (X11/20041012)
hi,

I just had my first success at self-migrating a domain across two hosts, with absolutely no involvement from Xen or Domain0. On the sending side I have a self-migrating XenLinux 2.4, migrated by a small userspace process inside it, which reads a checkpoint from /dev/checkpoint and writes it to a TCP socket.

On the receiving side I have a small (the kernel binary is 25952 bytes) TCP stack and server in an unprivileged domain. It receives the checkpoint, fixes up the pagetables, and jumps to the incoming data, which resumes there and has now been live-migrated to the new host.

Apart from the coolness-factor of being able to checkpoint and migrate oneself without outside involvement (as well as some performance benefits of not having to run with shadow page tables, though it has been a while since I made any direct comparisons against Ian's stuff), this to me seems to be good news for security. If a machine can run without any privileged code facing the network, the attack surface and thus risk of compromise is greatly reduced.

I will make binaries available tomorrow, if anyone is interested in playing with this? (Guess not, but at least I am having fun with this ;-))

Best,
Jacob


-------------------------------------------------------
This SF.Net email is sponsored by:
Sybase ASE Linux Express Edition - download now for FREE
LinuxWorld Reader's Choice Award Winner for best database on Linux.
http://ads.osdn.com/?ad_id=5588&alloc_id=12065&op=click
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/xen-devel

<Prev in Thread] Current Thread [Next in Thread>