LA-vIOMMU: An Efficient Hardware-Software Co-design of IOMMU Virtualization

被引:0
|
作者
Lv, Chen [1 ,2 ]
Zhang, Fuxin [1 ,2 ]
Gao, Xiang [3 ]
Zhu, Chen [3 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Beijing, Peoples R China
[3] Loongson Technol Corp Ltd, Beijing, Peoples R China
关键词
IOMMU virtualization; device passthrough; DMA security; I/O performance; PROTECTION; DMA;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom57177.2022.00038
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
I/O Memory Management Unit (IOMMU) is important hardware support for I/O virtualization, and it is widely used in device passthrough. However, IOMMU sacrifices memory utilization due to the static mapping requirement. Moreover, it lacks DMA security guarantees inside the guest. IOMMU virtualization is a decent solution among existing studies to address these problems. Nevertheless, pure software IOMMU virtualization suffers from high overhead, while hardware-assisted IOMMU virtualization needs complex hardware redesign. Therefore, enabling efficient design with low hardware overhead remains challenging. In this paper, we propose an efficient hardware-software co-design of IOMMU virtualization, named LA-vIOMMU, to achieve high I/O performance with low hardware overhead. LA-vIOMMU is designed based on the existing vIOMMU mode and can be adapted to other platforms. We describe the design and implementation of LA-vIOMMU. The LA-vIOMMU combines hardware expansion and software optimization to minimize the performance cost. Furthermore, we evaluate the effectiveness and security of LA-vIOMMU and analyze the advantages compared with the existing design in x86. The experiment results show that LA-vIOMMU can get superior throughput than existing software approaches and achieve throughput pretty close to hardware-assisted virtualization with fewer hardware design changes and less verification overhead.
引用
收藏
页码:246 / 253
页数:8
相关论文
共 50 条
  • [1] AES Hardware-Software Co-Design in WSN
    Otero, Carlos Tadeo Ortega
    Tse, Jonathan
    Manohar, Rajit
    [J]. 21ST IEEE INTERNATIONAL SYMPOSIUM ON ASYNCHRONOUS CIRCUITS AND SYSTEMS (ASYNC 2015), 2015, : 85 - 92
  • [2] Hardware-Software Co-Design of AES on FPGA
    Baskaran, Saambhavi
    Rajalakshmi, Pachamuthu
    [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 1118 - 1122
  • [3] Hardware-Software Co-Design for Decimal Multiplication
    Mian, Riaz-ul-haque
    Shintani, Michihiro
    Inoue, Michiko
    [J]. COMPUTERS, 2021, 10 (02) : 1 - 19
  • [4] HARDWARE-SOFTWARE CO-DESIGN OF EMBEDDED SYSTEMS
    WOLF, WH
    [J]. PROCEEDINGS OF THE IEEE, 1994, 82 (07) : 967 - 989
  • [5] A Hardware-Software Co-design for Efficient Intra-Enclave Isolation
    Gu, Jinyu
    Zhu, Bojun
    Li, Mingyu
    Li, Wentai
    Xia, Yubin
    Chen, Haibo
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3129 - 3145
  • [6] Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
    Chakraborty, Abhishek
    Srivastava, Ankur
    [J]. 2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, : 549 - 554
  • [7] Hardware-software co-design of a fingerprint matcher on card
    Fons, Mariano
    Fons, Francisco
    Canto, Enrique
    Lopez, Mariano
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 113 - 118
  • [8] Hardware-software co-design of an iris recognition algorithm
    Lopez, M.
    Daugman, J.
    Canto, E.
    [J]. IET INFORMATION SECURITY, 2011, 5 (01) : 60 - 68
  • [9] Component-based hardware-software co-design
    Arató, N
    Mann, ZA
    Orbán, A
    [J]. ORGANIC AND PERVASIVE COMPUTING - ARCS 2004, 2004, 2981 : 169 - 183
  • [10] Hardware-Software Co-Design for Network Performance Measurement
    Narayana, Srinivas
    Sivaraman, Anirudh
    Nathan, Vikram
    Alizadeh, Mohammad
    Walker, David
    Rexford, Jennifer
    Jeyakumar, Vimalkumar
    Kim, Changhoon
    [J]. PROCEEDINGS OF THE 15TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS '16), 2016, : 190 - 196