Virtualization D. J. Foreman 2009.

Slides:



Advertisements
Similar presentations
Virtualization Dr. Michael L. Collard
Advertisements

Popek & Goldberg’s notation
Unit 4 Chapter-1 Multitasking. The Task State Segment.
Microprocessors system architectures – IA32 real and virtual-8086 mode Jakub Yaghob.
Formal Requirements for Virtualizable Third Generation Architectures Gerald J. Popek University of California, Los Angeles and Robert P. Goldberg Honeywell.
Disco Running Commodity Operating Systems on Scalable Multiprocessors.
Virtualization for Cloud Computing
Distributed Systems CS Virtualization- Overview Lecture 22, Dec 4, 2013 Mohammad Hammoud 1.
© 2010 VMware Inc. All rights reserved Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel®
CSE 451: Operating Systems Winter 2012 Module 18 Virtual Machines Mark Zbikowski and Gary Kimura.
A Survey on Virtualization Technologies
Virtualization Technology Prof D M Dhamdhere CSE Department IIT Bombay Moving towards Virtualization… Department of Computer Science and Engineering, IIT.
Intel IA32 OS Support -Refresh
Tanenbaum 8.3 See references
CSC 660: Advanced Operating SystemsSlide #1 CSC 660: Advanced OS Virtual Machines.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
80386DX.
A Survey on Virtualization Technologies. Virtualization is “HOT” Microsoft acquires Connectix Corp. EMC acquires VMware Veritas acquires Ejascent IBM,
Virtualization Concepts Presented by: Mariano Diaz.
Virtualization Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation is licensed.
Operating Systems ECE344 Ashvin Goel ECE University of Toronto OS-Related Hardware.
Outline Basic VM Concepts Formal Definitions Virtualization Theorems
Formal Requirements for Virtualizable Third Generation Architectures
CS533 Concepts of Operating Systems Jonathan Walpole.
Microprocessor system architectures – IA32 introduction Jakub Yaghob.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Cloud Operating System Unit 09 Cloud OS Core Technology M. C. Chiang Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung,
Virtual 8086 Mode  The supports execution of one or more 8086, 8088, 80186, or programs in an protected-mode environment.  An 8086.
Full and Para Virtualization
CSC 660: Advanced Operating SystemsSlide #1 CSC 660: Advanced OS Virtual Machines.
Lecture 26 Virtual Machine Monitors. Virtual Machines Goal: run an guest OS over an host OS Who has done this? Why might it be useful? Examples: Vmware,
Lecture 12 Virtualization Overview 1 Dec. 1, 2015 Prof. Kyu Ho Park “Understanding Full Virtualization, Paravirtualization, and Hardware Assist”, White.
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
CSE 451: Operating Systems Winter 2015 Module 25 Virtual Machine Monitors Mark Zbikowski Allen Center 476 © 2013 Gribble, Lazowska,
Microprocessor system architectures – IA32 security
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
E Virtual Machines Lecture 2 CPU Virtualization Scott Devine VMware, Inc.
1 Virtualization "Virtualization software makes it possible to run multiple operating systems and multiple applications on the same server at the same.
CS 695 Topics in Virtualization and Cloud Computing, Autumn 2012 CS 695 Topics in Virtualization and Cloud Computing More Introduction + Processor Virtualization.
Operating Systems, 2016, Meni Adler, Danny Hendler & Amnon Meisels
Virtualization for Cloud Computing
VIRTUALIZATION.
Introduction to Virtualization
Virtualization.
Virtual Machine Monitors
Introduction to Operating Systems
Homework Reading Machine Projects Labs
Virtualization Technology
An Interrupt is either a Hardware generated CALL (externally derived from a hardware signal) OR A Software-generated CALL (internally derived from.
Presented by Mike Marty
Presented by Yoon-Soo Lee
Virtualization Dr. Michael L. Collard
Microprocessor and Assembly Language
Lecture 24 Virtual Machine Monitors
Formal Virtual Machines
OS Virtualization.
Virtualization Techniques
A Survey on Virtualization Technologies
Architectural Support for OS
Virtual machines benefits
Computer Security: Art and Science, 2nd Edition
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
Architectural Support for OS
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
System Virtualization
CS295: Modern Systems Virtualization
Test Optimization Using Software Virtualization
Slides from E0-253 taught by Arkaprava Basu and Vinod Ganapathy
Virtualization CS 161: Lecture 23 4/24/19.
Hypervisor A hypervisor or virtual machine monitor (VMM) is computer software, firmware or hardware that creates and runs virtual machines. A computer.
Presentation transcript:

Virtualization D. J. Foreman 2009

Reference Formal Requirements for Virtualizable Third Generation Architectures, Gerald Popek and Robert Goldberg, CACM, V17 N7, July 1974 http://portal.acm.org/citation.cfm?id=361011.361073 D. J. Foreman 2009

Advantages Resource configuration (RAM, devices, etc) Run multiple (different) O/S’s concurrently Test new releases Isolation Scalability (multiprocessor systems) D. J. Foreman 2009

Modes of Operation Full simulation (NOT a true VMM) Hybrid VM i.e.; instructions do not run natively Hybrid VM I/O resources are programmed by device drivers that run in a deprivileged service OS VMM (often called a hypervisor) large % of inst’s run natively All privileged instructions trap to VMM for emulation ©D. J. Foreman 2009

Types Full Virt. Paravirtualization H/W assisted Guest unchanged Generic device drivers Paravirtualization Guest can access host h/w Modified drivers H/W assisted VMM moved to h/w Requires virtualization h/w D. J. Foreman 2009

VMM Management Allocator - resource management Dispatcher - determines post-trap action Simulator performs the instruction limits effects to the VM VM sees only its own machine ©D. J. Foreman 2009

“Sensitive” i86 Instructions (in protected mode) Control – can change amount of resources without causing a trap Behavior – execution depends on real-memory location or mode Includes: IN - Input OUTS - Output String INS - Input String CLI - Clear Interrupt-Enable Flag (IF) OUT - Output STI - Set IF ©D. J. Foreman 2009

Privileged i86 Instructions include: CLTS - Clear Task-Switched Flag LMSW - Load Machine Status HLT - Halt Processor LTR - Load Task Register LGDT - Load GDT Register MOV CRn - Move Control Register LIDT - Load IDT Register MOV DRn - Move Debug Register LLDT - Load LDT Register MOV TRn - Move Test Register ©D. J. Foreman 2009

V86 mode sensitive Inst’s include: CLI - Clear IF POPF - Pop Flags STI - Set IF INT n - Software Interrupt PUSHF - Push Flags IRET - Interrupt Return POPF is both IOPL and CPL sensitive. IOPL will only be changed by POPF when executed at CPL = 0. The interrupt flag (IF) will only be changed by POPF if executed with CPL <= IOPL. If POPF does not change IOPL or the interrupt flag due to lack of privilege, no exception is generated. ©D. J. Foreman 2009

VMM Types Type I runs directly on real hardware. Type II Hybrid runs as an application on a host OS relies on the host OS for memory management, processor scheduling, resource allocation, and hardware drivers. When a VM traps by attempt to execute a sensitive instruction, the host OS must direct the signal to the VMM Hybrid interprets every privileged instruction ©D. J. Foreman 2009

X86 Problems There are Sensitive, Unprivileged instructions Do not cause an interrupt or exception! Do not perform intended actions Guest does not know they “failed” ©D. J. Foreman 2009