On the DMA Mapping Problem in Direct Device Assignment
|
|
- Virgil Allison
- 6 years ago
- Views:
Transcription
1 On the DMA Mapping Problem in Direct Device Assignment Ben-Ami Yassour Muli Ben-Yehuda Orit Wasserman IBM Research Haifa On the DMA Mapping Problem in Direct Device Assignment p. 1/32
2 Happy Birth Day Tomer Yassour On the DMA Mapping Problem in Direct Device Assignment p. 2/32
3 Virtual Machine I/O I/O virtualization is the final frontier How many of you would run your production database in a VM today? Virtual machines use one of three models for I/O: Device emulation Para-virtualized drivers Device assignment On the DMA Mapping Problem in Direct Device Assignment p. 3/32
4 I/O: Device Emulation HOST GUEST 1 device driver 2 4 device driver 3 device emulation On the DMA Mapping Problem in Direct Device Assignment p. 4/32
5 I/O: Para-virtualized Drivers HOST GUEST front end virtual driver 1 3 device driver 2 back end virtual driver On the DMA Mapping Problem in Direct Device Assignment p. 5/32
6 I/O: Direct Device Assignment HOST GUEST device driver On the DMA Mapping Problem in Direct Device Assignment p. 6/32
7 I/O: Direct Device Assignment cont Give VM direct access to a hardware device Without any software intermediaries between the virtual machine and the device Examples: Legacy adapters [Ben-Yehuda06] Self-virtualizing (SRIOV) adapters [Liu06], [Willman07] Best performance[santos08,09] but at a price. On the DMA Mapping Problem in Direct Device Assignment p. 7/32
8 The Linux/KVM Hypervisor A hypervisor extension for the Linux kernel [Kivity07] Makes extensive use of Intel and AMD hardware virtualization extensions Full featured, open source, and hacker friendly On the DMA Mapping Problem in Direct Device Assignment p. 8/32
9 DMA physical memory device A device B On the DMA Mapping Problem in Direct Device Assignment p. 9/32
10 DMA Security Untrusted guest programs a device, without any supervision. Device is DMA capable (all modern devices are). Which means the guest can program the device to overwrite any memory location.... including where the hypervisor lives... game over. On the DMA Mapping Problem in Direct Device Assignment p. 10/32
11 IOMMU On the DMA Mapping Problem in Direct Device Assignment p. 11/32
12 IOMMU to the rescue physical memory IOMMU device A device B IOMMU think MMU for I/O devices separate address spaces, protection from malicious devices! IOMMUs enable direct assignment for VMs. Intra-VM vs. Inter-VM protection [Willman08] But: IOMMUs have costs too [Ben-Yehuda07] On the DMA Mapping Problem in Direct Device Assignment p. 12/32
13 The Intel VT-d IOMMU On the DMA Mapping Problem in Direct Device Assignment p. 13/32
14 IOMMU Protection Strategies As defined by Willman, Rixner and Cox [Willman08]: Single-use Intra-guest protection, expensive! Shared Relaxed protection, expensive. Persistent Inter-guest protection, pins all of memory. Direct-map Inter-guest protection, no run-time cost, pins all of memory. On the DMA Mapping Problem in Direct Device Assignment p. 14/32
15 Direct-map Performance Send Note: with direct mapping, all memory is pinned! On the DMA Mapping Problem in Direct Device Assignment p. 15/32
16 Direct-map Performance Receive Note: with direct mapping, all memory is pinned! On the DMA Mapping Problem in Direct Device Assignment p. 16/32
17 The DMA Mapping Problem Single-use expensive! Shared expensive. Persistent pins all of memory. Direct-map pins all of memory. The DMA mapping problem: When should a memory page be mapped or unmapped for DMA? On the DMA Mapping Problem in Direct Device Assignment p. 17/32
18 On-Demand Mapping Strategy IOMMU remappings are expensive (world switch, IOTLB flush: over 10K cycles per remapping) A map-cache for caching IOMMU mappings when they are first created. How big should it be? Observation: all guests have some memory pinned anyway. Second observation: common workloads do not need to use all of the guest s memory address space. Define a quota for DMA mappings: the amount of memory the guest can pin for DMA. On the DMA Mapping Problem in Direct Device Assignment p. 18/32
19 The Map Cache Mappings are created when the guest first DMAs to that page. Mappings are either pinned (in use) or candidates for eviction. Implemented using a red-black tree. Mappings are removed from the cache when the quota is reached and a new mapping needs to be created. On the DMA Mapping Problem in Direct Device Assignment p. 19/32
20 Quota control Cooperative guests: defining a quota that is equal to their current memory requirements leads to no run-time IOMMU remappings best performance! Un-cooperative guests: smaller quota, hypervisor enforced. Now the question becomes: for a given quota that is smaller than the working set size, how to efficiently replace IOMMU mappings? Close resemblance to the classical page replacement problem.... except I/O devices do not have page faults. On the DMA Mapping Problem in Direct Device Assignment p. 20/32
21 Batching Mapping Requests If the driver batches together multiple mapping and unmapping requests, the map cache only goes to the hypervisor once. Downside: requires changing the drivers. Piggbyacking unmap requests on top of new mappings. On the DMA Mapping Problem in Direct Device Assignment p. 21/32
22 Prefetching No driver changes necessary! Same concept as FAR [Borodin91] and FARL [Fiat97] paging algorithms in the access graph model. Which pages were recently mapped after a given page? When mapping a new page, also opportunistically map its followers. Choose pages to evict using standard LRU. On the DMA Mapping Problem in Direct Device Assignment p. 22/32
23 Evaluation hit rate FIFO Evict pages in a first in first out order. LRU Evict the least recently used page. OPT Evict the page that is going to be used later then any other page in the cache. This is the optimal offline algorithm without batching. Optimal batching The optimal offline algorithm, but with batching. Prefetching. On the DMA Mapping Problem in Direct Device Assignment p. 23/32
24 netperf send hit rate per quota On the DMA Mapping Problem in Direct Device Assignment p. 24/32
25 apache hit rate per quota On the DMA Mapping Problem in Direct Device Assignment p. 25/32
26 Evaluation CPU utilization LRU Default LRU algorithm where no batching or caching is used. Piggyback Piggybacking unmaps on top of maps. Prefetching. Batching LRU with the map and unmap batching optimizations. On the DMA Mapping Problem in Direct Device Assignment p. 26/32
27 netperf send CPU utilization On the DMA Mapping Problem in Direct Device Assignment p. 27/32
28 apache CPU utilization On the DMA Mapping Problem in Direct Device Assignment p. 28/32
29 Summary & Conclusions Direct device assignment gives best performance of all I/O virtualization methods.... but also poses new problems. In particular, how to balance DMA mapping memory consumption and performance? We propose the on-demand DMA mapping strategy. Mappings are cached, with the size of the cache limited by a quota. Remappings are batched, and new mappings prefetched. Same run-time performance as persistent mapping, better memory utilization for common workloads. On the DMA Mapping Problem in Direct Device Assignment p. 29/32
30 Bibliography Barham03: Xen and the Art of Virtualization, SOSP 03 Bellard05: QEMU, a Fast and Portable Dynamic Translator, USENIX 05 Ben-Yehuda06: Utilizing IOMMUs for Virtualization in Linux and Xen, OLS 06 Ben-Yehuda07: The Price of Safety: Evaluating IOMMU Performance, OLS 07 Bhargave08: Accelerating two-dimensional page walks for virtualized systems, ASPLOS 08 On the DMA Mapping Problem in Direct Device Assignment p. 30/32
31 Bibliography cont. Borodin91: Competitive paging with locality of reference, STOC 91 Chen08: Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems, ASPLOS 08 Fiat97: Experimental studies of access graph based heuristics: beating the LRU standard?, SODA 97 Liu06: High Performance VMM-Bypass I/O in Virtual Machines, USENIX 06 Kivity07: kvm: The Kernel-Based Virtual Machine for Linux, OLS 07 Popek74: Formal Requirements for Virtualizable Third Generation Architectures, CACM 17(7), 74 On the DMA Mapping Problem in Direct Device Assignment p. 31/32
32 Bibliography cont. Santos08: Bridging the Gap between SW & HW Techniques for I/O Virtualization, USENIX 08 Santos 09: Achieving 10Gbps using Safe and Transparent Network Interface Virtualization, VEE 09 Willman07: Concurrent Direct Network Access for Virtual Machine Monitors, HPCA 07 Willman08: Protection Strategies for Direct Access to Virtualized I/O Devices, USENIX 08 Yassour08: Direct Device Assignment for Untrusted Fully-Virtualized Virtual Machines, Ben-Ami Yassour, Muli Ben-Yehuda, Orit Wasserman, IBM Research Report H-0263, 2008 On the DMA Mapping Problem in Direct Device Assignment p. 32/32
The Price of Safety: Evaluating IOMMU Performance
The Price of Safety: Evaluating IOMMU Performance Muli Ben-Yehuda 1 Jimi Xenidis 2 Michal Ostrowski 2 Karl Rister 3 Alexis Bruemmer 3 Leendert Van Doorn 4 1 muli@il.ibm.com 2 {jimix,mostrows}@watson.ibm.com
More informationIBM Research Report. Direct Device Assignment for Untrusted Fully-Virtualized Virtual Machines
H-0263 (H0809-006) September 20, 2008 Computer Science IBM Research Report Direct Device Assignment for Untrusted Fully-Virtualized Virtual Machines Ben-Ami Yassour, Muli Ben-Yehuda, Orit Wasserman IBM
More informationOS Virtualization. Why Virtualize? Introduction. Virtualization Basics 12/10/2012. Motivation. Types of Virtualization.
Virtualization Basics Motivation OS Virtualization CSC 456 Final Presentation Brandon D. Shroyer Types of Virtualization Process virtualization (Java) System virtualization (classic, hosted) Emulation
More informationBare-Metal Performance for x86 Virtualization
Bare-Metal Performance for x86 Virtualization Muli Ben-Yehuda Technion & IBM Research Muli Ben-Yehuda (Technion & IBM Research) Bare-Metal Perf. for x86 Virtualization Boston University, 2012 1 / 49 Background:
More informationVirtualization History and Future Trends
Virtualization History and Future Trends Christoffer Dall - Candidacy Exam - January 2013 Columbia University - Computer Science Department IBM Mainframe VMs VMware Workstation x86 Hardware Support Virtual
More informationVirtualization. Pradipta De
Virtualization Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
More informationVirtualization. Operating Systems, 2016, Meni Adler, Danny Hendler & Amnon Meisels
Virtualization Operating Systems, 2016, Meni Adler, Danny Hendler & Amnon Meisels 1 What is virtualization? Creating a virtual version of something o Hardware, operating system, application, network, memory,
More informationThe Architecture of Virtual Machines Lecture for the Embedded Systems Course CSD, University of Crete (April 29, 2014)
The Architecture of Virtual Machines Lecture for the Embedded Systems Course CSD, University of Crete (April 29, 2014) ManolisMarazakis (maraz@ics.forth.gr) Institute of Computer Science (ICS) Foundation
More informationSpring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand
Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,
More informationIOMMU: Strategies for Mitigating the IOTLB Bottleneck
Author manuscript, published in "WIOSCA 2010 - Sixth Annual Workshorp on the Interaction between Operating Systems and Computer Architecture (2010)" IOMMU: Strategies for Mitigating the IOTLB Bottleneck
More informationVirtual Machine Virtual Machine Types System Virtual Machine: virtualize a machine Container: virtualize an OS Program Virtual Machine: virtualize a process Language Virtual Machine: virtualize a language
More informationScalable I/O A Well-Architected Way to Do Scalable, Secure and Virtualized I/O
Scalable I/O A Well-Architected Way to Do Scalable, Secure and Virtualized I/O Julian Satran Leah Shalev Muli Ben-Yehuda Zorik Machulsky satran@il.ibm.com leah@il.ibm.com muli@il.ibm.com machulsk@il.ibm.com
More informationVirtualization. ! Physical Hardware Processors, memory, chipset, I/O devices, etc. Resources often grossly underutilized
Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.
More informationVirtualization. Starting Point: A Physical Machine. What is a Virtual Machine? Virtualization Properties. Types of Virtualization
Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.
More information24-vm.txt Mon Nov 21 22:13: Notes on Virtual Machines , Fall 2011 Carnegie Mellon University Randal E. Bryant.
24-vm.txt Mon Nov 21 22:13:36 2011 1 Notes on Virtual Machines 15-440, Fall 2011 Carnegie Mellon University Randal E. Bryant References: Tannenbaum, 3.2 Barham, et al., "Xen and the art of virtualization,"
More informationVirtual Virtual Memory
Virtual Virtual Memory Jason Power 3/20/2015 With contributions from Jayneel Gandhi and Lena Olson 4/17/2015 UNIVERSITY OF WISCONSIN 1 Virtual Machine History 1970 s: VMMs 1997: Disco 1999: VMWare (binary
More informationNested Virtualization and Server Consolidation
Nested Virtualization and Server Consolidation Vara Varavithya Department of Electrical Engineering, KMUTNB varavithya@gmail.com 1 Outline Virtualization & Background Nested Virtualization Hybrid-Nested
More informationModule 1: Virtualization. Types of Interfaces
Module 1: Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform
More informationIntroduction to Virtual Machines. Carl Waldspurger (SB SM 89 PhD 95) VMware R&D
Introduction to Virtual Machines Carl Waldspurger (SB SM 89 PhD 95) VMware R&D Overview Virtualization and VMs Processor Virtualization Memory Virtualization I/O Virtualization Typesof Virtualization Process
More informationIBM Research Report. The Turtles Project: Design and Implementation of Nested Virtualization
H-0282 (H1001-004) January 9, 2010 Computer Science IBM Research Report The Turtles Project: Design and Implementation of Nested Virtualization Muli Ben-Yehuda 1, Michael D. Day 2, Zvi Dubitzky 1, Michael
More informationIBM Research Report. The Turtles Project: Design and Implementation of Nested Virtualization
H-0282 (H1001-004) January 9, 2010 Computer Science IBM Research Report The Turtles Project: Design and Implementation of Nested Virtualization Muli Ben-Yehuda 1, Michael D. Day 2, Zvi Dubitzky 1, Michael
More informationCS 550 Operating Systems Spring Introduction to Virtual Machines
CS 550 Operating Systems Spring 2018 Introduction to Virtual Machines 1 How to share a physical computer Operating systems allows multiple processes/applications to run simultaneously Via process/memory
More informationVirtual Machines. To do. q VM over time q Implementation methods q Hardware features supporting VM q Next time: Midterm?
Virtual Machines To do q VM over time q Implementation methods q Hardware features supporting VM q Next time: Midterm? *Partially based on notes from C. Waldspurger, VMware, 2010 and Arpaci-Dusseau s Three
More informationNested Virtualization Friendly KVM
Nested Virtualization Friendly KVM Sheng Yang, Qing He, Eddie Dong 1 Virtualization vs. Nested Virtualization Single-Layer Virtualization Multi-Layer (Nested) Virtualization (L2) Virtual Platform (L1)
More informationA Userspace Packet Switch for Virtual Machines
SHRINKING THE HYPERVISOR ONE SUBSYSTEM AT A TIME A Userspace Packet Switch for Virtual Machines Julian Stecklina OS Group, TU Dresden jsteckli@os.inf.tu-dresden.de VEE 2014, Salt Lake City 1 Motivation
More informationreferences Virtualization services Topics Virtualization
references Virtualization services Virtual machines Intel Virtualization technology IEEE xplorer, May 2005 Comparison of software and hardware techniques for x86 virtualization ASPLOS 2006 Memory resource
More informationKnut Omang Ifi/Oracle 20 Oct, Introduction to virtualization (Virtual machines) Aspects of network virtualization:
Software and hardware support for Network Virtualization part 2 Knut Omang Ifi/Oracle 20 Oct, 2015 32 Overview Introduction to virtualization (Virtual machines) Aspects of network virtualization: Virtual
More informationExtended Page Tables (EPT) A VMM must protect host physical memory Multiple guest operating systems share the same host physical memory VMM typically implements protections through page-table shadowing
More informationCSE 120 Principles of Operating Systems
CSE 120 Principles of Operating Systems Spring 2018 Lecture 16: Virtual Machine Monitors Geoffrey M. Voelker Virtual Machine Monitors 2 Virtual Machine Monitors Virtual Machine Monitors (VMMs) are a hot
More informationVIRTUALIZATION: IBM VM/370 AND XEN
1 VIRTUALIZATION: IBM VM/370 AND XEN CS6410 Hakim Weatherspoon IBM VM/370 Robert Jay Creasy (1939-2005) Project leader of the first full virtualization hypervisor: IBM CP-40, a core component in the VM
More informationVirtualization, Xen and Denali
Virtualization, Xen and Denali Susmit Shannigrahi November 9, 2011 Susmit Shannigrahi () Virtualization, Xen and Denali November 9, 2011 1 / 70 Introduction Virtualization is the technology to allow two
More informationVirtualization. Adam Belay
Virtualization Adam Belay What is a virtual machine Simulation of a computer Running as an application on a host computer Accurate Isolated Fast Why use a virtual machine? To run multiple
More informationProtection Strategies for Direct Access to Virtualized I/O Devices
Protection Strategies for Direct Access to Virtualized I/O Devices Paul Willmann, Scott Rixner, and Alan L. Cox Rice University {willmann, rixner, alc}@rice.edu Abstract Commodity virtual machine monitors
More informationAdvanced Systems Security: Virtual Machine Systems
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:
More informationChapter 5 C. Virtual machines
Chapter 5 C Virtual machines Virtual Machines Host computer emulates guest operating system and machine resources Improved isolation of multiple guests Avoids security and reliability problems Aids sharing
More informationLearning Outcomes. Extended OS. Observations Operating systems provide well defined interfaces. Virtual Machines. Interface Levels
Learning Outcomes Extended OS An appreciation that the abstract interface to the system can be at different levels. Virtual machine monitors (VMMs) provide a lowlevel interface An understanding of trap
More informationVirtual Machine Security
Virtual Machine Security CSE443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ 1 Operating System Quandary Q: What is the primary goal
More informationI/O and virtualization
I/O and virtualization CSE-C3200 Operating systems Autumn 2015 (I), Lecture 8 Vesa Hirvisalo Today I/O management Control of I/O Data transfers, DMA (Direct Memory Access) Buffering Single buffering Double
More informationCOMPUTER ARCHITECTURE. Virtualization and Memory Hierarchy
COMPUTER ARCHITECTURE Virtualization and Memory Hierarchy 2 Contents Virtual memory. Policies and strategies. Page tables. Virtual machines. Requirements of virtual machines and ISA support. Virtual machines:
More informationTodd Deshane, Ph.D. Student, Clarkson University Xen Summit, June 23-24, 2008, Boston, MA, USA.
Todd Deshane, Ph.D. Student, Clarkson University Xen Summit, June 23-24, 2008, Boston, MA, USA. Xen and the Art of Virtualization (2003) Reported remarkable performance results Xen and the Art of Repeated
More informationWhat is KVM? KVM patch. Modern hypervisors must do many things that are already done by OSs Scheduler, Memory management, I/O stacks
LINUX-KVM The need for KVM x86 originally virtualization unfriendly No hardware provisions Instructions behave differently depending on privilege context(popf) Performance suffered on trap-and-emulate
More informationIntroduction to Cloud Computing and Virtualization. Mayank Mishra Sujesha Sudevalayam PhD Students CSE, IIT Bombay
Introduction to Cloud Computing and Virtualization By Mayank Mishra Sujesha Sudevalayam PhD Students CSE, IIT Bombay Talk Layout Cloud Computing Need Features Feasibility Virtualization of Machines What
More informationXen is not just paravirtualization
Xen is not just paravirtualization Dongli Zhang Oracle Asia Research and Development Centers (Beijing) dongli.zhang@oracle.com December 16, 2016 Dongli Zhang (Oracle) Xen is not just paravirtualization
More informationNON SCHOLAE, SED VITAE
TDIU11 Operating systems Operating System Structures and Machines [SGG7/8] Chapter 2.7-2.8 [SGG9] Chapter 2.7, 1.11.6 Copyright Notice: The lecture notes are modifications of the slides accompanying the
More informationVirtual Machines Disco and Xen (Lecture 10, cs262a) Ion Stoica & Ali Ghodsi UC Berkeley February 26, 2018
Virtual Machines Disco and Xen (Lecture 10, cs262a) Ion Stoica & Ali Ghodsi UC Berkeley February 26, 2018 Today s Papers Disco: Running Commodity Operating Systems on Scalable Multiprocessors, Edouard
More informationCS-580K/480K Advanced Topics in Cloud Computing. VM Virtualization II
CS-580K/480K Advanced Topics in Cloud Computing VM Virtualization II 1 How to Build a Virtual Machine? 2 How to Run a Program Compiling Source Program Loading Instruction Instruction Instruction Instruction
More informationIntel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey May 13, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey torreyj@ainfosec.com
More informationVirtualisation: The KVM Way. Amit Shah
Virtualisation: The KVM Way Amit Shah amit.shah@qumranet.com foss.in/2007 Virtualisation Simulation of computer system in software Components Processor Management: register state, instructions, exceptions
More informationPlatform Device Assignment to KVM-on-ARM Virtual Machines via VFIO
2014 International Conference on Embedded and Ubiquitous Computing Platform Device Assignment to KVM-on-ARM Virtual Machines via VFIO Antonios Motakis, Alvise Rigo, Daniel Raho Virtual Open Systems Grenoble,
More informationVirtual Machines. Jinkyu Jeong Computer Systems Laboratory Sungkyunkwan University
Virtual Machines Jinkyu Jeong (jinkyu@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today's Topics History and benefits of virtual machines Virtual machine technologies
More informationVirtualization. ...or how adding another layer of abstraction is changing the world. CIS 399: Unix Skills University of Pennsylvania.
Virtualization...or how adding another layer of abstraction is changing the world. CIS 399: Unix Skills University of Pennsylvania April 6, 2009 (CIS 399 Unix) Virtualization April 6, 2009 1 / 22 What
More informationMicro VMMs and Nested Virtualization
Micro VMMs and Nested Virtualization For the TCE 4th summer school on computer security, big data and innovation Baruch Chaikin, Intel 9 September 2015 Agenda Virtualization Basics The Micro VMM Nested
More informationVirtually Impossible
Virtually Impossible The Reality of Virtualization Security Gal Diskin / Chief Research Officer / Cyvera LTD. /WhoAmI? Chief Research Officer @ Cvyera LTD Formerly Security Evaluation Architect of the
More informationIntel Virtualization Technology Roadmap and VT-d Support in Xen
Intel Virtualization Technology Roadmap and VT-d Support in Xen Jun Nakajima Intel Open Source Technology Center Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.
More informationRedesigning Xen's Memory Sharing Mechanism for Safe and Efficient I/O Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner
Redesigning Xen's Memory Sharing Mechanism for Safe and Efficient I/O Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner HP Laboratories HPL-21-39 Keyword(s): No keywords available. Abstract:
More informationVirtual Machines. Part 2: starting 19 years ago. Operating Systems In Depth IX 1 Copyright 2018 Thomas W. Doeppner. All rights reserved.
Virtual Machines Part 2: starting 19 years ago Operating Systems In Depth IX 1 Copyright 2018 Thomas W. Doeppner. All rights reserved. Operating Systems In Depth IX 2 Copyright 2018 Thomas W. Doeppner.
More informationVirtualized SISCI. Extending Virtual Machines With a Shared Memory API Utilizing PCIe Networking. Halvor Kielland-Gyrud Master s Thesis Spring 2017
Virtualized SISCI Extending Virtual Machines With a Shared Memory API Utilizing PCIe Networking Halvor Kielland-Gyrud Master s Thesis Spring 2017 Virtualized SISCI Halvor Kielland-Gyrud February 15, 2017
More informationLecture 5. KVM for ARM. Christoffer Dall and Jason Nieh. 5 November, Operating Systems Practical. OSP Lecture 5, KVM for ARM 1/42
Lecture 5 KVM for ARM Christoffer Dall and Jason Nieh Operating Systems Practical 5 November, 2014 OSP Lecture 5, KVM for ARM 1/42 Contents Virtualization KVM Virtualization on ARM KVM/ARM: System architecture
More informationPassthrough in QEMU/KVM on Linux
Passthrough in QEMU/KVM on Linux G. Lettieri 2 Nov. 2017 Let see how hardware passthrough can be used in practice, using the QEMU hypervisor with the KVM API on Linux. We assume Intel hardware throughout
More informationFast access ===> use map to find object. HW == SW ===> map is in HW or SW or combo. Extend range ===> longer, hierarchical names
Fast access ===> use map to find object HW == SW ===> map is in HW or SW or combo Extend range ===> longer, hierarchical names How is map embodied: --- L1? --- Memory? The Environment ---- Long Latency
More informationFaithful Virtualization on a Real-Time Operating System
Faithful Virtualization on a Real-Time Operating System Henning Schild Adam Lackorzynski Alexander Warg Technische Universität Dresden Department of Computer Science Operating Systems Group 01062 Dresden
More informationSR-IOV support in Xen. Yaozu (Eddie) Dong Yunhong Jiang Kun (Kevin) Tian
SR-IOV support in Xen Yaozu (Eddie) Dong (Eddie.Dong@intel.com) Yunhong Jiang Kun (Kevin) Tian Agenda SR-IOV specification overview Xen/SR-IOV architecture Discussions 2 SR-IOV specification overview Start
More informationTo EL2, and Beyond! connect.linaro.org. Optimizing the Design and Implementation of KVM/ARM
To EL2, and Beyond! Optimizing the Design and Implementation of KVM/ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM Christoffer Dall Shih-Wei Li connect.linaro.org
More informationData Path acceleration techniques in a NFV world
Data Path acceleration techniques in a NFV world Mohanraj Venkatachalam, Purnendu Ghosh Abstract NFV is a revolutionary approach offering greater flexibility and scalability in the deployment of virtual
More informationSupport for Smart NICs. Ian Pratt
Support for Smart NICs Ian Pratt Outline Xen I/O Overview Why network I/O is harder than block Smart NIC taxonomy How Xen can exploit them Enhancing Network device channel NetChannel2 proposal I/O Architecture
More informationCS370 Operating Systems
CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2017 Lecture 27 Virtualization Slides based on Various sources 1 1 Virtualization Why we need virtualization? The concepts and
More informationVirtualization and memory hierarchy
Virtualization and memory hierarchy Computer Architecture J. Daniel García Sánchez (coordinator) David Expósito Singh Francisco Javier García Blas ARCOS Group Computer Science and Engineering Department
More informationVirtualization. Application Application Application. MCSN - N. Tonellotto - Distributed Enabling Platforms OPERATING SYSTEM OPERATING SYSTEM
Virtualization lication lication lication lication lication lication OPERATING SYSTEM OPERATING SYSTEM VIRTUALIZATION 1 Basic Idea Observation Hardware resources are typically under-utilized Hardware resources
More informationXen and the Art of Virtualization. Nikola Gvozdiev Georgian Mihaila
Xen and the Art of Virtualization Nikola Gvozdiev Georgian Mihaila Outline Xen and the Art of Virtualization Ian Pratt et al. I. The Art of Virtualization II. Xen, goals and design III. Xen evaluation
More informationSGX memory oversubscription
SGX memory oversubscription Somnath Chakrabarti, Rebekah Leslie-Hurd, Mona Vij, Frank McKeen, Carlos Rozas, Dror Caspi, llya Alexandrovich, Ittai Anati {somnath.chakrabarti, rebekah.leslie-hurd, mona.vij,
More informationVirtualization. Part 1 Concepts & XEN
Part 1 Concepts & XEN Concepts References and Sources James Smith, Ravi Nair, The Architectures of Virtual Machines, IEEE Computer, May 2005, pp. 32-38. Mendel Rosenblum, Tal Garfinkel, Virtual Machine
More informationThe Challenges of X86 Hardware Virtualization. GCC- Virtualization: Rajeev Wankar 36
The Challenges of X86 Hardware Virtualization GCC- Virtualization: Rajeev Wankar 36 The Challenges of X86 Hardware Virtualization X86 operating systems are designed to run directly on the bare-metal hardware,
More informationUtilizing the IOMMU Scalably
Utilizing the IOMMU Scalably USENIX Annual Technical Conference 2015 Omer Peleg, Adam Morrison, Benjamin Serebrin * and Dan Tsafrir * Google In This Talk IOMMU overview Main challenges to OSes Current
More informationTask Scheduling of Real- Time Media Processing with Hardware-Assisted Virtualization Heikki Holopainen
Task Scheduling of Real- Time Media Processing with Hardware-Assisted Virtualization Heikki Holopainen Aalto University School of Electrical Engineering Degree Programme in Communications Engineering Supervisor:
More informationAdvanced Systems Security: Virtual Machine Systems
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:
More informationVirtualization Introduction
Virtualization Introduction Simon COTER Principal Product Manager Oracle VM & VirtualBox simon.coter@oracle.com https://blogs.oracle.com/scoter November 21 st, 2016 Safe Harbor Statement The following
More informationLive Virtual Machine Migration with Efficient Working Set Prediction
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore Live Virtual Machine Migration with Efficient Working Set Prediction Ei Phyu Zaw
More informationSFO17-403: Optimizing the Design and Implementation of KVM/ARM
SFO17-403: Optimizing the Design and Implementation of KVM/ARM Christoffer Dall connect.linaro.org Efficient, isolated duplicate of the real machine Popek and Golberg [Formal requirements for virtualizable
More informationDistributed Systems COMP 212. Lecture 18 Othon Michail
Distributed Systems COMP 212 Lecture 18 Othon Michail Virtualisation & Cloud Computing 2/27 Protection rings It s all about protection rings in modern processors Hardware mechanism to protect data and
More informationPerformance of Kernels in Virtual Machines: An Introduction to KVM Hypervisor
International Journal of Scientific & Engineering Research, Volume 7, Issue 8, August-2016 551 Performance of Kernels in Virtual Machines: An Introduction to KVM Hypervisor Maryam Aurangzaib Abstract:
More informationSystem Virtual Machines
System Virtual Machines Outline Need and genesis of system Virtual Machines Basic concepts User Interface and Appearance State Management Resource Control Bare Metal and Hosted Virtual Machines Co-designed
More informationI/O virtualization. Jiang, Yunhong Yang, Xiaowei Software and Service Group 2009 虚拟化技术全国高校师资研讨班
I/O virtualization Jiang, Yunhong Yang, Xiaowei 1 Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
More informationVirtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu Virtualization Definition Framework or methodology of dividing the resources of a computer into multiple execution environments. Types Platform Virtualization: Simulate a
More informationA Survey on Virtualization Technologies
A Survey on Virtualization Technologies Virtualization is HOT Microsoft acquires Connectix Corp. EMC acquires VMware Veritas acquires Ejascent IBM, already a pioneer Sun working hard on it HP picking up
More informationSystem Virtual Machines
System Virtual Machines Outline Need and genesis of system Virtual Machines Basic concepts User Interface and Appearance State Management Resource Control Bare Metal and Hosted Virtual Machines Co-designed
More informationLinux and Xen. Andrea Sarro. andrea.sarro(at)quadrics.it. Linux Kernel Hacking Free Course IV Edition
Linux and Xen Andrea Sarro andrea.sarro(at)quadrics.it Linux Kernel Hacking Free Course IV Edition Andrea Sarro (andrea.sarro(at)quadrics.it) Linux and Xen 07/05/2008 1 / 37 Introduction Xen and Virtualization
More information0x1A Great Papers in Computer Security
CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ slide 1 X. Chen, T, Garfinkel, E. Lewis, P. Subrahmanyam, C. Waldspurger, D. Boneh, J. Dwoskin,
More informationCS370: Operating Systems [Spring 2017] Dept. Of Computer Science, Colorado State University
Frequently asked questions from the previous class survey CS 370: OPERATING SYSTEMS [VIRTUALIZATION] Shrideep Pallickara Computer Science Colorado State University Difference between physical and logical
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY Computer Systems Engineering: Spring Quiz I Solutions
Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.033 Computer Systems Engineering: Spring 2011 Quiz I Solutions There are 10 questions and 12 pages in this
More informationVirtual Machine Monitors!
ISA 673 Operating Systems Security Virtual Machine Monitors! Angelos Stavrou, George Mason University! Virtual Machine Monitors 2! Virtual Machine Monitors (VMMs) are everywhere! Industry commitment! Software:
More informationDISCO and Virtualization
DISCO and Virtualization 1. Announcements: a. Project now due Friday at 9 pm b. Class moving to CS 1325 starting Thursday. 2. Questions from reviews: a. NFS scalability bottleneck? i. Yes, other things
More informationVirtual Machine Monitors (VMMs) are a hot topic in
CSE 120 Principles of Operating Systems Winter 2007 Lecture 16: Virtual Machine Monitors Keith Marzullo and Geoffrey M. Voelker Virtual Machine Monitors Virtual Machine Monitors (VMMs) are a hot topic
More informationMultiprocessor Scheduling. Multiprocessor Scheduling
Multiprocessor Scheduling Will consider only shared memory multiprocessor or multi-core CPU Salient features: One or more caches: cache affinity is important Semaphores/locks typically implemented as spin-locks:
More informationCloud Computing Virtualization
Cloud Computing Virtualization Anil Madhavapeddy anil@recoil.org Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. x86 support for virtualization. Full and
More informationReal Safe Times in the Jailhouse Hypervisor Unrestricted Siemens AG All rights reserved
Siemens Corporate Technology Real Safe Times in the Jailhouse Hypervisor Real Safe Times in the Jailhouse Hypervisor Agenda Jailhouse introduction Safe isolation Architecture support Jailhouse application
More informationVirtual machine architecture and KVM analysis D 陳彥霖 B 郭宗倫
Virtual machine architecture and KVM analysis D97942011 陳彥霖 B96902030 郭宗倫 Virtual machine monitor serves as an interface between hardware and software; no matter what kind of hardware under, software can
More informationCS533 Concepts of Operating Systems. Jonathan Walpole
CS533 Concepts of Operating Systems Jonathan Walpole Disco : Running Commodity Operating Systems on Scalable Multiprocessors Outline Goal Problems and solutions Virtual Machine Monitors(VMM) Disco architecture
More informationAdministrative Details. CS 140 Final Review Session. Pre-Midterm. Plan For Today. Disks + I/O. Pre-Midterm, cont.
Administrative Details CS 140 Final Review Session Final exam: 12:15-3:15pm, Thursday March 18, Skilling Aud (here) Questions about course material or the exam? Post to the newsgroup with Exam Question
More informationCS 5600 Computer Systems. Lecture 11: Virtual Machine Monitors
CS 5600 Computer Systems Lecture 11: Virtual Machine Monitors History In the 70s, there were dozens of OSes Unlike today, where Windows and Android dominate This created many problems Upgrading hardware
More informationBackground. IBM sold expensive mainframes to large organizations. Monitor sits between one or more OSes and HW
Virtual Machines Background IBM sold expensive mainframes to large organizations Some wanted to run different OSes at the same time (because applications were developed on old OSes) Solution: IBM developed
More information