Advertisement

Memory Virtualization for MIPS Processor Based Cloud Server

  • Li Ruan
  • Huixiang Wang
  • Limin Xiao
  • Mingfa Zhu
  • Feibo Li
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7296)

Abstract

Although the Loongson 3 processor, one representative of RISC processors based on MIPS64 instruction set, nowadays gains increasing focus and applications in Servers, memory virtualization, a critical part of a system virtual machine for such MIPS processor based Cloud Severs, meets challenges such as non-virtualizable instruction set architecture, without hardware assistant and addresses translation from guest virtual address (GVA) to host physical address (HPA) supports. However, there are few virtualization researches on MIPS processor based Cloud Server and practical virtual systems are much fewer. This paper introduces a shadow TLB based memory virtualization method. We summarize the challenges and present the key technologies such as the memory architecture, address space construction and mapping mechanism, the shadow TLB maintenance method, etc. Experimental results show that our approach can provide effective memory virtualization support for MIPS processor based Cloud Servers.

Keywords

MIPS cloud computing sever virtualization memory virtualization 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    Institute of Computing Technology Chinese Academy of Sciences: Loongson 3A processor core manual (2009)Google Scholar
  3. 3.
    Wei, X., HuiXiang, W., LiMin, X., Li, R.: KVM for MIPS. In: The 2nd International Conference on Computer and Management (accepted)Google Scholar
  4. 4.
    Edouard, B., Scott, D.: Disco: Running Commodity Operating Systems on Scalable Multiprocessors. ACM Transactions on Computer Systems 4, 143–156 (1997)Google Scholar
  5. 5.
  6. 6.
    Adams, K., Agesen, O.: A Comparison of Software and Hardware Techniques for x86 Virtualization. VMware (2010)Google Scholar
  7. 7.
    VMware Technology: Virtualization: Architectural Considerations and Other Evaluation Criteria. VMware (2010)Google Scholar
  8. 8.
    Eyad, A., Ernie, C., et al.: Verifying shadow page table algorithms. In: Proceedings of the 2010 Conference on Formal Methods in Computer-Aided Design (FMCAD 2010), pp. 267–270. FMCAD Inc., Austin (2010)Google Scholar
  9. 9.

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Li Ruan
    • 1
    • 2
  • Huixiang Wang
    • 1
  • Limin Xiao
    • 1
    • 2
  • Mingfa Zhu
    • 1
  • Feibo Li
    • 1
  1. 1.School of Computer Science and EngineeringBeihang UniversityBeijingChina
  2. 2.State Key Laboratory of Rail Traffic Control and SafetyBeijing Jiaotong UniversityBeijingChina

Personalised recommendations