Filters








2,578 Hits in 2.6 sec

User-level DMA without operating system kernel modification

E.P. Markatos, M.G.H. Katevenis
Proceedings Third International Symposium on High-Performance Computer Architecture  
Low overhead user-level DMA is achieved without compromising protection, and without requiring changes to the underlying operating system kernel.  ...  This paper proposes several algorithms that allow user-level applications to start DMA operating without the involvement of the operating system.  ...  George Milolidakis helped with the performance evaluation of the various DMA al-  ... 
doi:10.1109/hpca.1997.569696 dblp:conf/hpca/MarkatosK97 fatcat:abagvxa7yna4hflxyp7tksezgu

User-level DMA extension for now/cluster architectures

Alexander P. Kemalov
2003 Proceedings of the 4th international conference conference on Computer systems and technologies e-Learning - CompSysTech '03  
This paper proposes several algorithms that allow applications to start DMA operation without OS kernel. The algorithms allow user-level applications to have direct access to the DMA engine.  ...  These trends imply that DMA operation becomes s lower /using operating system kernel/, compared to interconnection network.  ...  Fortunately our user-level DMA methods can be easily adapted to initiate DMA operation from user application without modification of OS kernel.  ... 
doi:10.1145/973620.973686 fatcat:czva5sgg4bfgzhv4ispml7znqe

Semi-user-level communication architecture

D. Meng, J. Ma, J. He, L. Xiao, Z. Xu
2002 Proceedings 16th International Parallel and Distributed Processing Symposium  
Different from traditional kernel-level networking architecture and user-level communication architecture, semi-user-level communication architecture removes OS kernel from its message-receiving path while  ...  Semi-user-level communication architecture has been implemented on a SMP workstation cluster system called DAWNING-3000, which is interconnected through Myrinet.  ...  Besides, Applications, which used the BCL user level library, can be ported to different platforms without modification.  ... 
doi:10.1109/ipdps.2002.1016641 dblp:conf/ipps/MengMHXX02 fatcat:sbxw4dm53jchtb4cvohx3i7pdi

Providing safe, user space access to fast, solid state disks

Adrian M. Caulfield, Todor I. Mollov, Louis Alex Eisner, Arup De, Joel Coburn, Steven Swanson
2012 Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS '12  
As a result, applications can access file data without operating system intervention, eliminating OS and file system costs entirely for most accesses.  ...  Existing applications require no modification to use the new interface.  ...  Prior work [3, 4, 31] proposed supporting user space IO and initiating DMA transfers from user space without kernel intervention.  ... 
doi:10.1145/2150976.2151017 dblp:conf/asplos/CaulfieldMEDCS12 fatcat:kb2ql3kpuzhihoyl6rpsy4dg7q

Providing safe, user space access to fast, solid state disks

Adrian M. Caulfield, Todor I. Mollov, Louis Alex Eisner, Arup De, Joel Coburn, Steven Swanson
2012 SIGARCH Computer Architecture News  
As a result, applications can access file data without operating system intervention, eliminating OS and file system costs entirely for most accesses.  ...  Existing applications require no modification to use the new interface.  ...  Prior work [3, 4, 31] proposed supporting user space IO and initiating DMA transfers from user space without kernel intervention.  ... 
doi:10.1145/2189750.2151017 fatcat:diyttz27d5harogj3wegw5w6qe

A virtual graphics card for teaching device driver design

Christopher Corsi, Robert Geist, Dennis Lingerfelt
2014 Proceedings of the 45th ACM technical symposium on Computer science education - SIGCSE '14  
System virtualization tools, such as VMWare, Xen, VirtualBox, and KVM, allow students to freely experiment with kernel modifications without requiring dedicated hardware and without generating significant  ...  This paper describes an extremely simple, kernel-independent, software tool for use by instructors of operating systems courses.  ...  Linux, like most operating systems, uses paged memory management with both kernel mode and user mode address translations.  ... 
doi:10.1145/2538862.2538895 dblp:conf/sigcse/CorsiGL14 fatcat:ailaxbooxbevzkta6s75evl6he

Virtual-memory-mapped network interfaces

M.A. Blumrich, C. Dubnicki, E.W. Felten, Kai Li, M.R. Mesarina
1995 IEEE Micro  
processes from the operating system kerneL Here we compare the two interfaces and discuss the performance trade-offs between them.  ...  Both support vMual-memory-mapped communication, allowing user processes to communicate without expensive buffer management and without making system calls across the protection boundary separating user  ...  That is, we can perform a receive operation entirely at the user level, without making a system call.  ... 
doi:10.1109/40.342014 fatcat:revq3zjjlbfsxjvu7nhqrdno6u

Virtualizing high-performance graphics cards for driver design and development

Robert Geist, Zachary H. Jones, James Westall
2009 Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research - CASCON '09  
Drivers written for the virtual cards can be used verbatim, without special function calls or kernel modifications, as drivers for real cards, should real cards of the same design exist.  ...  Operating system virtualization tools such as VMWare, XEN, and Linux KVM export only minimally capable SVGA graphics adapters.  ...  His research interests include operating systems performance, computer graphics, and visualization. He received a Ph.D. in mathematics from the University of Notre Dame. Zachary H.  ... 
doi:10.1145/1723028.1723058 dblp:conf/cascon/GeistJW09 fatcat:v4dgzfwnyfhkvnx76kaq6vpvyy

Impact of protocol overheads on network throughput over high-speed interconnects: measurement, analysis, and improvement

Hyun-Wook Jin, Chuck Yoo
2007 Journal of Supercomputing  
by the Faculty Research Fund of Konkuk University in 2006. 2 comprehensive optimizations, we show that UDP/IP can utilize more than 95% of the maximum network throughput a Myrinet-based experimental system  ...  When an application calls the send system call, our mechanism lets the system call return without copying data into the kernel buffer.  ...  In addition to the IP-based protocols, Myrinet also provides the high-speed user-level protocol called GM.  ... 
doi:10.1007/s11227-007-0101-0 fatcat:nhrk7aq4b5cylbj7aszqcuwlpy

NGSCB: A Trusted Open System [chapter]

Marcus Peinado, Yuqun Chen, Paul England, John Manferdelli
2004 Lecture Notes in Computer Science  
This includes operating the system without trusting the BIOS, most devices and device drivers and the bulk of the code of mass market operating systems.  ...  We have implemented a prototype of the system and expect the full system to be mass deployed.  ...  Clearly, reducing the assurance level of the operating system has implications for the rest of the system. If the isolation kernel implements mandatory access control (e.g.  ... 
doi:10.1007/978-3-540-27800-9_8 fatcat:imgnr4bj3zgxlerzil5h72nwmm

SecVisor

Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig
2007 ACM SIGOPS Operating Systems Review  
Examples attacks are: arbitrary modification of all memory contents, injection of malicious code into the system firmware (also called the BIOS on x86 systems), malicious DMA writes to memory using peripherals  ...  Within the guest VM, the OS executes at the highest CPU privilege level, while user applications execute at the lowest CPU privilege level. Figure 4 : 4 Operation of the nested page tables.  ... 
doi:10.1145/1323293.1294294 fatcat:3mr5vhvuxrfz7a4edqi4tg432m

SecVisor

Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig
2007 Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles - SOSP '07  
Examples attacks are: arbitrary modification of all memory contents, injection of malicious code into the system firmware (also called the BIOS on x86 systems), malicious DMA writes to memory using peripherals  ...  Within the guest VM, the OS executes at the highest CPU privilege level, while user applications execute at the lowest CPU privilege level. Figure 4 : 4 Operation of the nested page tables.  ... 
doi:10.1145/1294261.1294294 dblp:conf/sosp/SeshadriLQP07 fatcat:7o4mox2l5rcwjbr4o4n2e2ykfi

A sledgehammer approach to reuse of legacy device drivers

Joshua LeVasseur, Volkmar Uhlig
2004 Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC - EW11  
New operating systems should benefit from the existing device driver code base without demanding legacy support from the kernel.  ...  Device drivers account for the majority of an operating system's code base, and reuse of the existing driver infrastructure is a pragmatic requirement of any new OS project.  ...  Available interfaces include the user level API of the DD/OS (e.g., file access to emulate a raw disk), raw device access from user level (e.g., Linux raw sockets), abstracted kernel module interfaces  ... 
doi:10.1145/1133572.1133617 dblp:conf/sigopsE/LeVasseurU04 fatcat:aacnwkpjebaqjn5myiq4jbo27y

A Coprocessor-based Introspection Framework via Intel Management Engine

Lei Zhou, Fengwei Zhang, Jidong Xiao, Kevin Leach, Westley Weimer, Xuhua Ding, Guojun Wang
2021 IEEE Transactions on Dependable and Secure Computing  
However, these approaches either require a large Trusted Computing Base (TCB) or they must share CPU time with the operating system, disrupting normal execution.  ...  ., x86 SMM and ARM TrustZone) have been used to defend against low-level malware such as rootkits.  ...  In the user-space level, the processes running in the Target System are the main interface for users' services.  ... 
doi:10.1109/tdsc.2021.3071092 fatcat:3ocain7qijdyflvr3lrrn7z5si

High-speed data paths in host-based routers

S. Walton, A. Hutton, J. Touch
1998 Computer  
Our innovations offer design hints for network interface design and host operating system software.  ...  Systems requiring software modification, such as experimental routing testbeds (like DARPA Research Testbed Network and Collaborative Advanced Interagency Research Network) and dynamically reprogrammable  ...  Kernel-level streaming relies on the System V Streams interface.  ... 
doi:10.1109/2.730736 fatcat:dfwr6gvj7fc5voaxcgoadaioje
« Previous Showing results 1 — 15 out of 2,578 results