Automating Pre-Virtualization for Memory Objects

نویسنده

  • Yaowei Yang
چکیده

Virtualization is used to construct several virtual machines on a physical machine for high utilization and other benefits. The virtual machines should run independently within their own domain without disturbing the others’ execution. In order to achieve this purpose, two things are considered: virtualization-sensitive instruction and sensitive memory operation. Since the virtualization-sensitive instructions and memory operations could change the actual state of physical resources — e.g. CPU, memory and I/O devices — the virtual machine must prohibit their use. The virtual machine monitor must fully control them and share them among many virtual machines. Currently, virtualization technologies suffer from either performance penalty or high engineering effort to work around the virtualization sensitive instruction and sensitive memory operation. Pre-virtualization tries to balance these two factors by using code analysis, and successfully achieves high performance with low porting engineering effort for virtualizing virtualization sensitive instructions, but it lacks automation for the sensitive memory operations. In this thesis, we analyze the technique used by pre-virtualization for automatically virtualizing virtualization sensitive instructions and find out that the limitation of this technique comes from the simple type system of assembly language. Therefore, we propose a solution for this problem that parses source code in a programming language that has a rich type system. By using this enhancement, pre-virtualization can achieve high performance and low engineering effort for virtualizating both virtualization sensitive instructions and sensitive memory operations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

3D Modelling of Under Ground Burried Objects Based on Ground Penetration Radar

There is a growing demand for mapping and 3D modelling of buried objects such as pipelines, agricultural hetitage, landmines and other buried objects. Usually, large scale and high resolution maps from these objects are needed. Manually map generation and modeling of these objects are cost and time consuming and is dependent on lots of resources. Therefore, automating the subsurface mapping and...

متن کامل

اثر مسئولیت‌پذیری بر سوگیری و اطمینان به حافظه در بیماران مبتلا به وسواس وارسی

AbstractObjectives: Considering the importance of memory problems in the development and maintenance of obsessive-compulsive disorder, the present study has been carried out with the goal of evaluating a number of memory functions in patients with the mentioned disorder. Method: In order to study memory bias and confidence, and the effects of responsibility on them in patients with checking obs...

متن کامل

An Intelligent Vision System on a Mobile Manipulator

This article will introduce a robust vision system which was implemented on a mobile manipulator. This robot has to find objects and deliver them to pre specified locations. In the first stage, a method which is named color adjacency method was employed. However, this method needs a large amount of memory and the process is very slow on computers with small memories. Therefore since the previou...

متن کامل

Hardware Assisted OS Virtualization

Operating System-level virtualization, also known as a container, is an increasingly popular approach to isolating applications that use the same underlying OS kernel [2, 5–7]. Containers have recently gained popularity as the default back-end for Docker, an application packaging and distribution system used by companies including Google [3]. The purported reason to use containers over a hardwa...

متن کامل

Techniques for Reducing the Down Time during Virtual Machine Migration: Resource Failure & Live Migration Circumstances

Virtual Machines need migration from the present host to an another appropriate one due to error in the present hardware or presently loaded scenario causing slowness of execution. Most of the situations fall into second category leading to a solution called live migration. Here, in live migration the virtual machine runs for sometime on the present host while its required data gets transferred...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007