{"title":"The design of the virtual memory aspects of a virtual machine","authors":"D. Parnas, W. R. Price","doi":"10.1145/800122.803957","DOIUrl":"https://doi.org/10.1145/800122.803957","url":null,"abstract":"This paper discusses the design of a virtual memory mechanism for use as the first level of an operating system. The virtual memory mechanism provides a virtual machine which retains many of the properties of the host computer system. An implementation on the PDP-11/45 is briefly described.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133100435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design and implementation of a virtual machine operating system using a Virtual Access Method","authors":"James H. March","doi":"10.1145/800122.803945","DOIUrl":"https://doi.org/10.1145/800122.803945","url":null,"abstract":"In the autumn of 1969, we decided to try a new approach to the design of a virtual machine operating system. Until that time, most installations using Virtual Machine Monitors merely ran operating systems that already existed for “stand-alone” use. Few, if any, installations had attempted to design and create an operating system that took advantage of its running environment. The Virtual Machine Monitor we were using was a highly modified version of CP-67 which was designed to operate on an IBM S/360 Model 67. Our design motivation centered on the reduction of CP-67 overhead by reducing the amount of virtual memory required to support the operating system. A secondary design goal was to produce a “production oriented” system. The resulting operating system should be able to be “tailored” to a particular user's requirements.\u0000 The design of the New System (NS), as it came to be called, revolved around the fact that it not only knew it was executing within a virtual machine, but took advantage of it. Special communication links were designed and installed allowing NS to more directly control its paging and I/O profile.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116138107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual machine or virtual operating system?","authors":"J. Bellino, C. Hans","doi":"10.1145/800122.803946","DOIUrl":"https://doi.org/10.1145/800122.803946","url":null,"abstract":"Development of a multi-access system from an existing single-user system can be achieved by the virtual machine approach. If the virtual machines generated include as primitives the logical functions used by the single-user system activated on them, these extended virtual machines are able to support the single-user system at a decreased development, maintenance and running cost.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127369701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the relationship between virtual machines and emulators","authors":"E. Mallach","doi":"10.1145/800122.803952","DOIUrl":"https://doi.org/10.1145/800122.803952","url":null,"abstract":"The subjects of virtual machines and emulators have been treated as entirely separate. The purpose of this paper is to show that they have much in common. Not only do the usual implementations have many shared characteristics, but this commonality extends to the theoretical concepts on which they are based; the concepts of memory mapping and I/O operation simulation are discussed to emphasize this. The paper then discusses structural issues, and points out why the question of instruction set is becoming less valid as a point of distinction between the concepts. Possible combinations of virtual machines and emulators are discussed. In conclusion, it is recommended that workers in both fields keep the relationship between the two in mind.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128405673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual micromachines (Whatever happened to milliprocessors)","authors":"H. Schwenk","doi":"10.1145/800122.803959","DOIUrl":"https://doi.org/10.1145/800122.803959","url":null,"abstract":"The main point of this note is a rather obvious one: The notion of virtual computer systems applies to many levels (macro-, micro-, nano-, pico-, etc.) of processors and associated units as well as to conventional data processing systems. Since these processors and units of whatever level all include the same basic notion of computation, we have come to use the term computational theater to represent the idea of a formally described processing system, independent of the level of processing.\u0000 Self-virtualizability is not a likely property of today's microprocessors; however, the current trend toward user visible microprogramming may be expected to influence the architecture of microprocessing systems in ways that will lessen the difficulty of implementing a virtual microprocessing capability. This point is discussed below.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130435317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual machines and data security","authors":"C. R. Attanasio","doi":"10.1145/800122.803960","DOIUrl":"https://doi.org/10.1145/800122.803960","url":null,"abstract":"Our concern is the ability of the computing system to ensure that data under its control is accessed only in accordance with the explicit intention of the owner of the data, as expressed in the directory or access control table of the system.\u0000 We intend to use VM/370 as the base system for a study of how the security of data may be compromised. Our goal for this study is to be better able to evaluate different types of hardware and software system architectures with regard to their ability to provide security.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128525715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extended architecture and Hypervisor performance","authors":"Carl J. Young","doi":"10.1145/800122.803956","DOIUrl":"https://doi.org/10.1145/800122.803956","url":null,"abstract":"This paper is a brief summary of the impact that architecture extensions to hardware and software have upon the design and performance of software Hypervisors that are intended to provide the extended function in a virtual machine environment.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125311810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A recursive virtual machine architecture","authors":"H. Lauer, D. Wyeth","doi":"10.1145/800122.803951","DOIUrl":"https://doi.org/10.1145/800122.803951","url":null,"abstract":"This paper summarizes the preliminary design of a computer system with a recursive, virtual machine architecture and gives a brief account of the considerations leading to that design . In this system, each process operates in its own address space, called its virtual memory, and can create other processes within its space and pass control to them. The newly create d processes can, recursively, create their own descendants without the knowledge or assistance of a supervisor. There is no “privileged” or “supervisor” state; protection is provided entirely by the virtual memory mechanism, and each interrupt is directed by hardware to the process designated to handle it. Virtual memories are segmented; moreover, paging is treated as a recursive application of segmentation and can occur at any level. The machine architecture encourages modular and hierarchical approaches to program design because of the high degree of protection afforded by the creation of new virtual memories at low cost.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128493574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient virtual machine implementation","authors":"R. Srodawa, L. Bates","doi":"10.1145/800122.803949","DOIUrl":"https://doi.org/10.1145/800122.803949","url":null,"abstract":"This paper describes the techniques used to implement an efficient virtual machine facility within MTS for the IBM System/360 Model 67. The goals of the project were to support the IBM Operating System, including the Indexed Sequential Access Method and Teleprocessing capabilities, as a subsystem under MTS with a maximum teleprocessing degradation of 30% for OS/360 programs and complete protection between OS/360 and MTS. The first attempt, using channel program relocation similar to that employed by CP-67, provided unacceptable response to teleprocessing requests which required indexed accesses to the data base. The second attempt obviated the need for most software relocation of channel programs by assuring that the OS/360 buffer areas and channel programs were allocated to main storage having addresses identical to their virtual addresses. Storage protection was accomplished by a hardware change to the IBM System/360 protection mechanism which created a two-level hierarchy of storage keys. Using these techniques the virtual machine met the goals of the project. The techniques employed are applicable to virtual memory systems other than MTS and the IBM System/360 Model 67","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132753218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecture of virtual machines","authors":"R. Goldberg","doi":"10.1145/800122.803950","DOIUrl":"https://doi.org/10.1145/800122.803950","url":null,"abstract":"In this paper we develop a model which represents the addressing of resources by processes executing on a virtual machine. The model distinguishes two maps: the ø-map which represents the map visible to the operating system software running on the virtual machine, and the f-map which is invisible to that software but which is manipulated by the virtual machine monitor running on the real machine. The ø-map maps process names into resource names and the f-map maps virtual resource names into real resource names. Thus, a process running on a virtual machine addresses its resources under the composed map f o ø. In recursive operation, f maps from one virtual machine level to another and we have f o f o ... o f o ø.\u0000 The model is used to describe and characterize previous virtual machine designs. We also introduce and illustrate a general approach for implementing virtual machines which follows directly from the model. This design, the Hardware Virtualizer, handles all process exceptions directly within the executing virtual machine without software intervention. All resource faults (VM-faults) generated by a virtual machine are directed to the appropriate virtual machine monitor without the knowledge of processes on the virtual machine (regardless of the level of recursion).","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127240832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}