System Virtualization 1 Learning Objective: –To understand the implementation choices and details of System Virtualization COMP25212 1.

Slides:



Advertisements
Similar presentations
Hardware-assisted Virtualization
Advertisements

Virtualization Technology
E Virtual Machines Lecture 3 Memory Virtualization
1 Virtual Memory Management B.Ramamurthy. 2 Demand Paging Main memory LAS 0 LAS 1 LAS 2 (Physical Address Space -PAS) LAS - Logical Address.
Bart Miller. Outline Definition and goals Paravirtualization System Architecture The Virtual Machine Interface Memory Management CPU Device I/O Network,
OS Fall ’ 02 Introduction Operating Systems Fall 2002.
Xen and the Art of Virtualization A paper from the University of Cambridge, presented by Charlie Schluting For CS533 at Portland State University.
A critical assault upon “A Comparison of Software and Hardware Techniques for x86 Virtualization” Chris Smowton.
Disco Running Commodity Operating Systems on Scalable Multiprocessors.
OS Spring’03 Introduction Operating Systems Spring 2003.
1 Last Class: Introduction Operating system = interface between user & architecture Importance of OS OS history: Change is only constant User-level Applications.
1 Virtual Memory Management B.Ramamurthy Chapter 10.
KVM/ARM: The Design and Implementation of the Linux ARM Hypervisor Fall 2014 Presented By: Probir Roy.
1 OS & Computer Architecture Modern OS Functionality (brief review) Architecture Basics Hardware Support for OS Features.
Virtual Machines. Virtualization Virtualization deals with “extending or replacing an existing interface so as to mimic the behavior of another system”
LINUX Virtualization Running other code under LINUX.
Xen and the Art of Virtualization Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield.
虛擬化技術 Virtualization and Virtual Machines
Introduction to Virtual Machines. Administration Presentation and class participation: 40% –Each student will present two and a half times this semester.
Virtualization Technology Prof D M Dhamdhere CSE Department IIT Bombay Moving towards Virtualization… Department of Computer Science and Engineering, IIT.
Tanenbaum 8.3 See references
Zen and the Art of Virtualization Paul Barham, et al. University of Cambridge, Microsoft Research Cambridge Published by ACM SOSP’03 Presented by Tina.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
Virtualization Concepts Presented by: Mariano Diaz.
Benefits: Increased server utilization Reduced IT TCO Improved IT agility.
Xen I/O Overview. Xen is a popular open-source x86 virtual machine monitor – full-virtualization – para-virtualization para-virtualization as a more efficient.
Virtualization Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation is licensed.
Virtual Machine and its Role in Distributed Systems.
Operating Systems ECE344 Ashvin Goel ECE University of Toronto OS-Related Hardware.
CS533 Concepts of Operating Systems Jonathan Walpole.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Operating Systems Lecture November 2015© Copyright Virtual University of Pakistan 2 Agenda for Today Review of previous lecture Hardware (I/O, memory,
Virtualisation Front Side Buses SMP systems COMP Jamie Curtis.
Virtual Memory Lecture for CPSC 5155 Edward Bosworth, Ph.D. Computer Science Department Columbus State University.
Operating System Structure A key concept of operating systems is multiprogramming. –Goal of multiprogramming is to efficiently utilize all of the computing.
4.3 Virtual Memory. Virtual memory  Want to run programs (code+stack+data) larger than available memory.  Overlays programmer divides program into pieces.
Full and Para Virtualization
Lecture 26 Virtual Machine Monitors. Virtual Machines Goal: run an guest OS over an host OS Who has done this? Why might it be useful? Examples: Vmware,
Operating-System Structures
CSE 451: Operating Systems Winter 2015 Module 25 Virtual Machine Monitors Mark Zbikowski Allen Center 476 © 2013 Gribble, Lazowska,
Virtualizing a Multiprocessor Machine on a Network of Computers Easy & efficient utilization of distributed resources Goal Kenji KanedaYoshihiro OyamaAkinori.
CS 140 Lecture Notes: Virtual MachinesSlide 1 Process Abstraction Instruction Set Registers MMU I/O Devices Physical Memory Virtual Memory System Calls.
Virtualization Neependra Khare
CS 695 Topics in Virtualization and Cloud Computing, Autumn 2012 CS 695 Topics in Virtualization and Cloud Computing More Introduction + Processor Virtualization.
Lecture 13: Virtual Machines
Introduction to Virtualization
Virtualization Technology
Xen and the Art of Virtualization
Why VT-d Direct memory access (DMA) is a method that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing.
Presented by Mike Marty
CS352H: Computer Systems Architecture
Lecture 24 Virtual Machine Monitors
Virtualization overview
Morgan Kaufmann Publishers
Disco: Running Commodity Operating Systems on Scalable Multiprocessors
Running other code under LINUX
CS 140 Lecture Notes: Virtual Machines
OS Virtualization.
Lecture 28: Virtual Memory-Address Translation
Virtualization Techniques
OS Virtualization.
CS 140 Lecture Notes: Virtual Machines
Operating Systems Lecture 3.
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
Computer System Structures
CS 140 Lecture Notes: Virtual Machines
Xen and the Art of Virtualization
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
System Virtualization
4.3 Virtual Memory.
Presentation transcript:

System Virtualization 1 Learning Objective: –To understand the implementation choices and details of System Virtualization COMP

Aims and Definitions COMP Application Operating System Hardware Applications Guest A Operating System Virtual Machine Monitor/Hypervisor Applications Host Hardware Guest B Operating System UnvirtualizedVirtualized Host: Guest:

Hosted Virtualization COMP Applications Guest A Operating System Applications Host Hardware Guest B Operating System Application Host Operating System Virtual Machine Monitor/Hypervisor Advantages? Disadvantages?

Xen Guest 0 Virtualization COMP Applications Guest 0 Operating System Applications Host Hardware Guest B Operating System Application Virtual Machine Monitor/Hypervisor Advantages? Disadvantages? Guest A Operating System

Revision: OS Protection/Privilege OS handles physical resources: –Privileged Application isolated from resources: –Non-privileged COMP Application Operating System Hardware Unvirtualized

Virtualization: Protection/Privilege VMM handles physical resources: –Privileged Guest OS isolated from resources –non- (less- )privileged COMP Applications Guest A Operating System Virtual Machine Monitor/Hypervisor Applications Host Hardware Guest B Operating System Virtualized VMM gets control on every guest OS access to physical resource

What Physical Resources are Guarded? Timers CPU registers: –Interrupt Enable –Page Table Base Device Control Registers –Programmed I/O? –Interrupt I/O? –DMA I/O? Interrupts (may be for different Guest?) Memory Mapping (page tables) COMP

How does Guest Cause VMM Entry? VMM designers are (a bit) lucky: –Many Guest accesses to physical resources cause trap in non-privileged mode –So, running the OS in non-privileged mode suffices BUT some instructions behave differently (without trapping) in privileged and non- priv mode e.g. Intel “Store into Flags” COMP

Memory Accessing in Virtualization COMP Virtual Address VMMPage Tables Physical Address Virtualized Virtual Address OS Page Tables (+ TLBs for efficiency) Physical Address Unvirtualized OS Page Tables TLBs ??

Interfacing Guest OS and VMM Three solutions today: a)Software (static) b)Software (dynamic) c)Hardware (dynamic) COMP

ParaVirtualization Modify Guest OS to be Virtualization-aware: a)call VMM for all privileged operations b)cooperate with VMM over shared page tables c)call VMM for input-output Advantages? Disadvantages? COMP

Detect and Fix Interfaces in VMM Detection: –Write-protect Guest OS page tables –Code-scan (Dynamic Binary Translation?) Guest OS for unsafe instructions – plant traps Fixing: –Use write-error trap to detect guest page-table writes –Provide “shadow page tables” for hardware TLBs –Use “illegal instruction” and “trap” traps COMP

Detect and Fix Interfaces in Hardware Requirement: –VMM runs more-privileged than Guest OS Hardware provides Application/OS and VMM modes When Virtualization is active, all OS accesses to physical resources trap to VMM Advantages? Disadvantages? COMP

The Manchester Solution … watch this space … or help make it happen! COMP