Virtualizing the VAX architecture

This paper describes modifications to the VAX architecture to support virtual machines. The VAX architecture contains several instructions that are sensitive but not privileged. It is also the first architecture with more than two protection rings to support virtual machines. A technique for mapping four virtual rings onto three physical rings, employing both software and microcode, is described. Differences between the modified and standard VAX architectures are presented. along with a description of the virtual VAX computer.

[1]  Stuart E. Madnick,et al.  Application and analysis of the virtual machine approach to information system security and isolation , 1973, Workshop on Virtual Computer Systems.

[2]  Robert P. Goldberg,et al.  Architectural Principles for Virtual Computer Systems , 1973 .

[3]  Gerald J. Popek,et al.  Formal requirements for virtualizable third generation architectures , 1974, CACM.

[4]  M. Malik,et al.  Operating Systems , 1992, Lecture Notes in Computer Science.

[5]  Gerald J. Popek,et al.  The PDP-11 virtual machine architecture: A case study , 1975, SOSP.

[6]  Richard A. MacKinnon The Changing Virtual Machine Environment: Interfaces to Real Hardware, Virtual Hardware, and Other Virtual Machines , 1979, IBM Syst. J..

[7]  Arthur G. Olbert Crossing the machine interface , 1982, MICRO 15.

[8]  Peter H. Gum,et al.  System/370 Extended Architecture: Facilities for Virtual Machines , 1983, IBM J. Res. Dev..

[9]  William H. Tetzlaff,et al.  Paging Enhancements in VM/SP HPO , 1984, Int. CMG Conference.

[10]  Umeno Hidenori,et al.  Reduction of 2-0-Translation Table Maintenance Overhead in a Virtual Machine System , 1985 .

[11]  Timothy E. Leonard VAX architecture reference manual , 1987 .

[12]  Jerry Greenberg,et al.  A Page-Swapping Prototype for VM/HPO , 1987, IBM Syst. J..

[13]  Mary Ellen Zurko,et al.  A VMM security kernel for the VAX architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[14]  K. F. Seiden,et al.  The auditing facility for a VMM security kernel , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[15]  Paul A. Karger,et al.  Storage channels in disk arm optimization , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[16]  John M. Boone,et al.  INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .

[17]  Wei-Ming Hu,et al.  Reducing timing channels with fuzzy time , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.