Check out the new USENIX Web site. [Next] [Up] [Previous]
Next: Ilwaco Guest OS Up: Isolation Kernel Implementation Previous: I/O Devices and Interrupt

Supervisor Virtual Machine

Denali gives special privileges to a supervisor VM, including the ability to create and destroy other VMs. Because complexity is a source of security vulnerabilities, wherever possible we have displaced complexity from the isolation kernel to the supervisor VM. For example, the isolation kernel does not have a network stack: if a remote VM image needs to be downloaded for execution, this is done by the supervisor VM. Similarly, the supervisor VM keeps track of the association between virtual disks and VMs, and is responsible for initializing or loading initial disk images into virtual disks. The supervisor VM can be accessed via the console, or through a simple telnet interface. In a production system, the security of the supervisor VM should be enhanced by using a secure login protocol such as ssh.



Andrew Whitaker 2002-10-07