Full Virtualization The context for this question is the sam…
Full Virtualization The context for this question is the same as the previous question. An engineering firm is running a critical, unmodified legacy CAD application inside a fully virtualized VM on an older x86 server. The application frequently makes privileged calls that interact directly with the hardware. An administrator notices poor performance and learns that this specific, older x86 architecture has a “quirk” where certain privileged instructions, when executed by the guest OS (which is running in an unprivileged mode), fail silently instead of causing a trap to the hypervisor. [2 points] What technique does VMware ESX use to overcome this architectural limitation and ensure the guest OS functions correctly?
Read DetailsPotpourri Answer the following questions with respect to the…
Potpourri Answer the following questions with respect to the MCS barrier algorithm: [2 points] (Answer True/False with justification) (No credit without justification) For the correct functioning of the algorithm, it requires an atomic read-modify-write instruction to be supported in the architecture.
Read DetailsParavirtualization The context for this question is the same…
Paravirtualization The context for this question is the same as the previous question. Above picture shows the I/O ring data structure used in Xen to facilitate communication between the guest OS and Xen. Guest-OS places a request in the I/O ring using the “Request Producer” pointer. Xen places a response in the I/O ring using the “Response Producer” pointer. [2 points] You are implementing disk I/O in a guest OS using Xen’s I/O ring. What steps are needed to achieve zero-copy semantics for a block write?
Read DetailsLock/Barriers Consider Anderson’s array-based queuing lock s…
Lock/Barriers Consider Anderson’s array-based queuing lock shown pictorially below, where N is the number of processors. One disadvantage of this algorithm is that the size of the array has to be as big as the number of processors. An alternative is to use a dynamic array wherein the array can be grown based on the number of simultaneous lock requestors. [3 points] Give one advantage and one disadvantage of this idea compared to the MCS lock algorithm that uses a linked list to implement the lock as opposed to an array.
Read Details