{"title":"SIVARM的实现:ARM架构的简单VMM","authors":"A. Suzuki, S. Oikawa","doi":"10.1109/IC-NC.2010.23","DOIUrl":null,"url":null,"abstract":"By using Virutal Machine Monitors (VMMs)\\cite{vmm}, we can overcome many issues in embedded systems. The performance gain of recent hardware enables the use of VMM even in small embedded systems. We implemented a VMM for the ARM architecture that is the most widely used CPU for embedded systems. We name it SIVARM: a simple VMM for the ARM architecture. Since the VMM executes in privileged mode and its guest OS executes in non-privileged mode, the VMM can catch the execution of sensitive instructions as exceptions and emulate them appropriately. The guest OS can execute in non-privileged mode thanks to the virtual banked registers and the virtual processor mode provided by the VMM. Domains are used to control the access between the guest OS and the VMM. The VMM was implemented for the ARM926EJ-S processor, and can successfully boot the Linux on it.","PeriodicalId":375145,"journal":{"name":"2010 First International Conference on Networking and Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Implementation of SIVARM: A Simple VMM for the ARM Architecture\",\"authors\":\"A. Suzuki, S. Oikawa\",\"doi\":\"10.1109/IC-NC.2010.23\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"By using Virutal Machine Monitors (VMMs)\\\\cite{vmm}, we can overcome many issues in embedded systems. The performance gain of recent hardware enables the use of VMM even in small embedded systems. We implemented a VMM for the ARM architecture that is the most widely used CPU for embedded systems. We name it SIVARM: a simple VMM for the ARM architecture. Since the VMM executes in privileged mode and its guest OS executes in non-privileged mode, the VMM can catch the execution of sensitive instructions as exceptions and emulate them appropriately. The guest OS can execute in non-privileged mode thanks to the virtual banked registers and the virtual processor mode provided by the VMM. Domains are used to control the access between the guest OS and the VMM. The VMM was implemented for the ARM926EJ-S processor, and can successfully boot the Linux on it.\",\"PeriodicalId\":375145,\"journal\":{\"name\":\"2010 First International Conference on Networking and Computing\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 First International Conference on Networking and Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC-NC.2010.23\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 First International Conference on Networking and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC-NC.2010.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementation of SIVARM: A Simple VMM for the ARM Architecture
By using Virutal Machine Monitors (VMMs)\cite{vmm}, we can overcome many issues in embedded systems. The performance gain of recent hardware enables the use of VMM even in small embedded systems. We implemented a VMM for the ARM architecture that is the most widely used CPU for embedded systems. We name it SIVARM: a simple VMM for the ARM architecture. Since the VMM executes in privileged mode and its guest OS executes in non-privileged mode, the VMM can catch the execution of sensitive instructions as exceptions and emulate them appropriately. The guest OS can execute in non-privileged mode thanks to the virtual banked registers and the virtual processor mode provided by the VMM. Domains are used to control the access between the guest OS and the VMM. The VMM was implemented for the ARM926EJ-S processor, and can successfully boot the Linux on it.