7

[2201.09652] DuVisor: a User-level Hypervisor Through Delegated Virtualization

 2 years ago
source link: https://arxiv.org/abs/2201.09652
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Computer Science > Operating Systems

[Submitted on 24 Jan 2022]

DuVisor: a User-level Hypervisor Through Delegated Virtualization

Download PDF

Today's mainstream virtualization systems comprise of two cooperative components: a kernel-resident driver that accesses virtualization hardware and a user-level helper process that provides VM management and I/O virtualization. However, this virtualization architecture has intrinsic issues in both security (a large attack surface) and performance. While there is a long thread of work trying to minimize the kernel-resident driver by offloading functions to user mode, they face a fundamental tradeoff between security and performance: more offloading may reduce the kernel attack surface, yet increase the runtime ring crossings between the helper process and the driver, and thus more performance cost.
This paper explores a new design called delegated virtualization, which completely separates the control plane (the kernel driver) from the data plane (the helper process) and thus eliminates the kernel driver from runtime intervention. The resulting user-level hypervisor, called DuVisor, can handle all VM operations without trapping into the kernel once the kernel driver has done the initialization. DuVisor retrofits existing hardware virtualization support with a new delegated virtualization extension to directly handle VM exits, configure virtualization registers, manage the stage-2 page table and virtual devices in user mode. We have implemented the hardware extension on an open-source RISC-V CPU and built a Rust-based hypervisor atop the hardware. Evaluation on FireSim shows that DuVisor outperforms KVM by up to 47.96\% in a variety of real-world applications and significantly reduces the attack surface.

Comments: 17 pages, 9 figures Subjects: Operating Systems (cs.OS); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR) Cite as: arXiv:2201.09652 [cs.OS]   (or arXiv:2201.09652v1 [cs.OS] for this version)

Submission history

From: Zeyu Mi [view email]
[v1] Mon, 24 Jan 2022 13:17:51 UTC (2,392 KB)

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK