Platform Virtualization: Model, Challenges and Approaches
|
|
|
- Rudolph Sharp
- 10 years ago
- Views:
Transcription
1 Platform Virtualization: Model, Challenges and Approaches Fangzhou Jiao, Yuan Luo School of Informatics and Computing Indiana University {fjiao,
2 Outlines Virtualization Overview Virtualization Models Formal Definition of Virtualization: Popek and Goldberg s Virtualization Requirements Overview of x86 Virtualization: Obstacles and Solutions Virtualization on the move 2
3 Virtualization Overview What s Virtualization? Why Virtualization? 3
4 What s Virtualization Virtualization is a technology that combines or divides (computing) resources to present one or many operating environments. 4
5 Virtualization: What is it, really? Virtualization using methodologies such as, Hardware/software partitioning (or aggregation) Partial or complete machine simulation Emulation (again, can be partial or complete) Time-sharing (in fact, sharing in general) In general, can be M-to-N mapping (M real resources, N virtual resources) Examples: VM (M-N), Grid Computing (M-1), Multitasking (1-N) 5
6 Virtualization Everywhere Driver Gas Machine Gas Station Attendants Gas Pump 6
7 Virtualization: Any demands? Server consolidation Application Consolidation Sandboxing Multiple execution environments Virtual hardware Debugging Software migration (Mobility) Appliance (software) Testing/Quality Assurance 7
8 The Traditional Server Concept Web Server App Server DB Server Windows Linux Linux Windows IIS Glassfish MySQL Exchange 8
9 And if something goes wrong... Web Server App Server DB Server Windows DOWN! Linux Windows IIS MySQL Exchange 9
10 The Traditional Server Concept Pros Easy to conceptualize Fairly easy to deploy Easy to backup Virtually any application/service can be run from this type of setup Cons Expensive to acquire and maintain hardware Not very scalable Difficult to replicate Redundancy is difficult to implement In many cases, processor is under-utilized 10
11 The Virtual Server Concept Virtual Machine Monitor (VMM) layer between Guest OS and hardware 11
12 The Virtual Server Concept Pros Resource pooling Highly redundant Highly available Rapidly deploy new servers Easy to deploy Reconfigurable while services are running Optimizes physical resources by doing more with less Cons Slightly harder to conceptualize Slightly more costly (must buy hardware, OS, Apps, and now the abstraction layer) BACK 12
13 Virtualization Abstraction Levels Instruction Set Architecture (ISA) Emulate the ISA in software Interprets, translates to host ISA (if required) Device abstractions implemented in software Inefficient Optimizations: Caching, Code reorganization Applications: Debugging, Teaching, multiple OS Hardware Abstraction Layer (HAL) Between real machine and emulator (maps to real hardware) Handling non-virtualizable architectures (code scanning, dynamic instruction rewriting) Applications: Fast and usable, virtual hardware, consolidation, migration. 13
14 Virtualization Abstraction Levels cont d Operating System Level Virtualized SysCall Interface (may be same) May or may not provide all the device abstractions Easy to manipulate (create, configure, destroy) Library (user-level API) Level Presents a different subsystem API to application Complex implementation, if kernel API is limited User-level device drivers Application (Programming Language) Level Virtual architecture (ISA, registers, memory, ) Platform-independence (highly portable) Less control on the system (extremely high-level) 14
15 Overall Picture ISA HAL OS Library PL Performance * **** **** *** ** Flexibility **** *** ** ** ** Ease of Implementation Degree of Isolation ** * *** ** ** *** **** ** ** *** (more stars are better) 15
16 Instruction Set Architecture Level Virtualization Technologies Emulation: Translates guest ISA to native ISA Translation Cache: Optimizes emulation by making use of similar recent instructions Code rearrangement Speculative scheduling (alias hardware) Issues Efficient Exception handling Self-modifying code 16
17 ISA Level Virtualization: Examples Bochs: Open source x86 emulator Emulates whole PC environment x86 processor and most of the hardware (VGA, disk, keyboard, mouse, ) Custom BIOS, emulation of power-up, reboot Host ISAs: x86, PowerPC, Alpha, Sun, and MIPS Crusoe (Transmeta) Code morphing engine dynamic x86 emulator on VLIW processor 16 MB memory as translation cache Shadow registers: Enables easy exception handling QEMU: User space only, and full system emulation Multiple target ISAs: x86, ARM, PowerPC, Sparc Full-software MMU and simulation(using mmap() system call) Dynamic Translation 17
18 HAL Virtualization Techniques Standalone vs. Hosted Drivers Host and VMM worlds I/O Protection Rings Multilevel privilege domains Handling silent fails Scan code and insert/replace artificial traps 18
19 Intel x86 Protection Rings 19
20 Paravirtualization Traditional architectures do not scale Interrupt handling Memory management World switching Virtualized architecture interface Much simpler architectural interface Virtual I/O and CPU instructions, registers, Portability is lost 20
21 Examples Denali Xen 21
22 Programming Level Virtualization Java Virtual Machine (JVM) Executes Java byte code (virtual instructions) Provides the implementation for the instruction set interpreter (or JIT compiler) Provides code verification, garbage collection, etc Hardware access through underlying OS JVM Architecture Stack-based architecture No MMU Virtual hardware: PC, register-set, heap, method (code) areas Rich instruction set Direct object manipulation, type conversion, exception throws Provides a runtime environment through JRE Other Examples:.NET CLI, Parrot (PERL 6) BACK 22
23 Virtual Machine Implementation: Issues Only one bare machine interface to guest system! What architectures are considered as virtualizable? A virtualizable architecture allows any instruction inspecting/modifying machine state to be trapped when executed in any but the most privileged mode - Popek & Goldberg (1974) What about x86 machines? BACK 23
24 x86 Virtualization: Obstacles and Solutions
25 Processor Virtualization Goal of processor virtualization: 25
26 Processor Virtualization Goal of processor virtualization: Identical environment and behavior with physical machine. Efficiency: most instructions should be directly executed by processor. Control to resource: i. Isolation of resources; ii. Hypervisor can gain control for allocated resources if needed. 26
27 Processor Virtualization These goals needs instruction set support. What features of modern processors can contribute to these goals of virtualization? 27
28 Processor Virtualization Privilege Levels: Hypervisor should run in higher privilege level than guest OS. Memory protection system: Virtual memory: offered address isolation And more? 28
29 Processor Virtualization First we define the sensitive instructions 29
30 Processor Virtualization First we define the sensitive instructions Sensitive instructions: Instructions which can interfere the global status of system. 30
31 Processor Virtualization 1. Instructions which changes or references the state of VM or machine. 2. Instructions which changes or reads the sensitive register or memory location. 3. Instructions which changes or references the memory protection system. 4. Instructions which execution results depends on the state of machine, or memory protection system, or privilege level. 31
32 Processor Virtualization Popek and Goldberg s virtualization requirements: If all the sensitive instructions were privileged, the instruction set is ready for virtualization. What about x86 instructions? 32
33 Obstacles of x86 Virtualization Instructions involved sensitive registers: SGDT, SIDT, SLDT SMSW PUSHF, POPF 33
34 Obstacles of x86 Virtualization Sensitive Registers GDTR (Global descriptor table register) IDTR (Interrupt descriptor table register) LDTR (Local descriptor table register) Store segment descriptors which containing base address, type, length and access rights for memory segments. 34
35 Obstacles of x86 Virtualization GDTR, IDTR, LDTR Typically, x86 processors only have one register of these three. But each virtual machine needs to keep the segmentation information of themselves. When all guest OS sharing one segment register, the guest OS may see the segment descriptor of other guest OS or hypervisor, since the segment register only can be loaded in CPL 0. MSW register Fangzhou similar Jiao & with Yuan Luo this. 35
36 Obstacles of x86 Virtualization Instructions: SMSW, PUSHF, POPF SMSW, PUSHF: Executing these two instructions involved checking the content of sensitive registers (CR0, EFLAGS) So the guest OS is able to found it was running in virtual machine. 36
37 Obstacles of x86 Virtualization Ambiguous result in different privilege ring: POPF (Push/pop EFLAGS) Different bits in EFLAGS have different write privilege levels. Guest OS usually not executing in CPL 0, so POPF will not raise exception not trapped, only generated results without modify some bits in EFLAGS. 37
38 Obstacles of x86 Virtualization Instructions which result relies on memory protection system or privilege level: LAR, LSL, VERR, VERW POP, PUSH CALL, JUMP, INT, RET MOVE 38
39 Obstacles of x86 Virtualization When a guest OS executing such instructions, it is possible for discovering itself was not running in CPL=0, thus the guest OS will not execute properly. 39
40 Instruction Sensitive Privileged Violated Source Destination Semantic Explanation Rules SGDT Y N 3B [Register] GDTR Memory Store The registers GDTR, LDTR, IDTR, and CR0, SIDT Y N 3B [Register] IDTR Memory / Store EFLAGS should be maintained as different Register registers for different VMs. So the operations to SLDT Y N 3B [Register] LDTR Memory Store these registers could lead to result that one VM modified other VM's state. SMSW Y N 3B [Register] CR0 Memory / Store Register SMSW Y N 3B [Register] CR0 Memory / Register Store PUSHF Y Ambiguous 3B [Register] EFLAGS Stack Push stack POPF Y Ambiguous 3B Stack [Register] Pop stack EFLAGS Still involved registers should be per-vm. Also these instructions can be executed when have no enough privilege, but the whole system was left as an ambiguous state. LAR Y N 3C Segment Descriptor [Register] GP Load (Access Rights) LSL Y N 3C Segment [Register] GP Load (Segment Descriptor Limit) VERR Y N 3C Segment N/A Verify (Readable) Descriptor VERW Y N 3C Segment N/A Verify (Writable) Descriptor POP Y N 3C Stack [Register] GP Pop stack PUSH Y N 3C Stack [Register] GP Push stack Execution of these instructions involved checking the CPL. The result relies on the CPL. In guest OS the CPL could be different with the OS expected, so there would be trouble. CALL Y N 3C Call subroutine Only cross privilege level calls are sensitive. JMP Y N 3C Jump to Croo privilege level calls involved a lot of CPL check. INT Y N 3C Interrupt RET Y N 3C Return STR Y N 3C Task Register [Register] Store [Segment Selector] GP/Memory MOVE Y N 3C Move When CS or SS register involved, the CPL bits in CS or SS can be referenced or updated, and the guest OS can found inconsistency in CPL.
41 Obstacles of x86 Virtualization: Memory Management For each virtual machine, the address should be maintained independently and isolated. 40
42 Obstacles of x86 Virtualization: Memory Management So in virtualized system, two level address translation were needed: Guest Virtual Address to Guest Physical Address Guest Physical Address to Native Physical Address 41
43 Obstacles of x86 Virtualization: Memory Management Traditional solution: Shadow page tables MMU was not aware of the exist of shadow page table So we need generate page fault to update the TLB to keep it updated with both page tables 42
44 Obstacles of x86 Virtualization: Memory Management Shadow Page Table and Guest Page Table Address Translation Guest Page Table Guest Virtual Address to Guest Physical Address Shadow Page Table Guest Physical Address to Native Physical Address Visible Guest Hypervisor Updated by Guest Hypervisor Numbers Per VM Per VM 43
45 Obstacles of x86 Virtualization x86 machines cannot satisfy the virtualization requirement... So how to cope with these obstacles of x86 virtualization? 44
46 x86 Virtualization: Traditional approach First one and the older one: Binary translation The virtual machine monitoring all the instructions executed by guest OS, when founding a sensitive instruction, it executes a series of dynamic generated instructions instead of directly execute the original sensitive instruction. 45
47 x86 Virtualization: Traditional approach Another, quite new solution: Paravirtualization Modify the guest operating system, replace the sensitive operations with virtualization-safe routines. 46
48 Processor Virtualization Limitations of traditional approach Binary translation Paravirtualization Performance Relatively Low Faster Guest OS Portability Need not modify Guest OS Guest OS should be rewrite 47
49 Processor Virtualization One major advantage of x86 platform is plenty of software. Modify the instruction set of x86 for better support to virtualization is not practical considering the legacy software. So what can we do..? 48
50 x86 Virtualization: New approach Intel VT and AMD-V: Hardware assisted x86 virtualization. 49
51 x86 Virtualization: New approach New processor states: VMX non-root operation mode: for guest OS VMX root operation mode: for hypervisor State transition between these two state were assisted by hardware 50
52 x86 Virtualization: New approach Example of VMX instructions 1. VMCALL: This simply calls the VM monitor, causing the VM to exit. 2. VMCLEAR: copies VMCS data to memory in case it is written there 3. VMLAUNCH: launches a virtual machine, and changes the launch state of the VMCS to be launched, if it is clear. 4. VMPTRLD: loads a pointer to the VMCS. 5. VMPTRST: stores a pointer to the VMCS. 6. VMREAD: read specified field from VMCS. 7. VMRESUME: resumes a virtual machine. 8. VMWRITE: write specified field in VMCS. 9. VMXOFF: terminates VMX operation. 10. VMXON: starts VMX operation. 51
53 x86 Virtualization: New approach VMCS: Virtual Machine Control Structure Guest Area: Per-VM information, included the sensitive registers (CRs, DRs, RSP/RIP/RFLAGS, Segment registers, MSR) and other non-register states. Host Area: Sensitive registers, and other machine states which belongs to hypervisor. BACK 52
54 x86 Virtualization: New approach MMU Virtualization: Nested page table MMU knows the exist of shadow page tables, MMU handled gpa->npa translation BACK 53
55 Brief overview to x86 Virtualization: Obstacles and Solutions Popek and Goldberg s Ideal Virtual Machine Characteristics Obstacles to virtualization in x86 architecture Traditional solutions New solution: Hardware-assisted x86 virtualization Identical environment with physical machine Many instructions need to check CPL (Current Privilege Level), so a Guest OS is able to found it was running in a virtual machine since it could found the CPL is not in 0, which is the privilege level for operating system kernels. Or some instructions could have ambiguous result when executed in different CPLs. The Hypercalls : modify guest OS to make it can communicate with hypervisor explicitly; or binary translation New processor modes: VMX Root operations and VMX Non-root operations. You can just think it as Privilege Level -1, like a new privilege level for hypervisors. Efficiently execution of virtual machine Circumventing other obstacles can lead to serious performance downgrade Hypercalls can reduce the overhead of binary translation, however it need to modify guest OS. Hardware based state transition between guest state (VMX Non-root) and hypervisor state (VMX Root). When sensitive instructions were encountered, the processor automatically signals the hypervisor to handle it. Resource Control: VMM complete control to resources and Resource isolation between different guest OS. Memory virtualization: Guest physical address space should be isolated for different guest operating systems. Just like an additional level of virtual memory. However the performance could be lower since it caused more TLB miss and page faults. Shadow page tables, etc. Nested page tables(aka EPT for Intel): CR3 become a per-vm register and can be automatically switched when switching between different guest OS. Guest physical to hypervisor physical address translation were managed by hardware MMU. Guest OS now can perform address translation transparently, without too much overhead. Virtual machines were considered as Logical processors, so some processor state should be kept as per-vm manner, like segmentation registers, flag registers, machine state word, etc. However x86 only have one register for these sensitive registers, this could lead to the violation of resource isolation. Use binary translation, Hypercalls to implement the save and load of guest states. VMCS: Virtual Machine Control Structure For tracking each guest OS s private state. And can be automatically switched when context switching between different guest OS.
56 Virtualization: on the move BACK 54
57 Virtualization on the move GPU virtualization? GPU is used more and more in HPC Allocate the computing resources of GPU more efficiently. Virtualization as resource integration? m physical machines to 1 or n (n<=m) virtual machines? ScaleMP BACK 55
58 References [1] POPEK, G. J., AND GOLDBERG, R. P., Formal requirements for virtualizable third generation architectures. Commun. ACM 17, 7 (1974), [2] J. S. Robin and C. E. Irvine, Analysis of the Intel Pentium's ability to support a secure virtual machine monitor. In Proceedings of the 9th USENIX Security Symposium, Denver, CO, USA, pages , Aug [3] Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield, Xen and the art of virtualization. In Proceedings of the nineteenth ACM symposium on Operating Systems Principles (SOSP19), pages ACM Press, [4] Keith Adams, Ole Agesen, A Comparison of Software and Hardware Techniques for x86 Virtualization. ASPLOS 06 [5] NEIGER, G., SANTONI, A., LEUNG, F.,RODGERS, D., AND UHLIG, R., Intel virtualization technology: Hardware support for efficient processor virtualization. Intel Technology Journal 10, 3 (2006). [6] INTEL CORPORATION. Intel Virtualization Technology Specification for the IA-32 Intel R Architecture, April 2005 [7] Advanced Micro Devices, Inc. White paper on AMD-V Nested Paging, Rev. 1.0, July, 2008 [8] Susanta Nanda, Tzi-cker Chiueh, A Survey on Virtualization Technologies. RPE Report, pages 1 42, [9] I. Pratt et al, Xen 3.0 and the Art of Virtualization. In Proc. of the Ottawa Linux Symposium, [10] VMWare, Inc. Understanding full virtualization, paravirtualization, and hardware assist [11] A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori. kvm: the Linux virtual machine monitor. In OLS 07: The 2007 Ottawa Linux Symposium, pages , July
59 Thank You! 57
Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/
Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This
CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization
CS 695 Topics in Virtualization and Cloud Computing More Introduction + Processor Virtualization (source for all images: Virtual Machines: Versatile Platforms for Systems and Processes Morgan Kaufmann;
Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13
Virtualization Clothing the Wolf in Wool Virtual Machines Began in 1960s with IBM and MIT Project MAC Also called open shop operating systems Present user with the view of a bare machine Execute most instructions
Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:
Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
Brian Walters. 1999. VMware Virtual Platform. Linux J. 1999, 63es, Article 6 (July 1999).
Implements BIOS emulation support for BHyVe: A BSD Hypervisor Abstract Current BHyVe only supports FreeBSD/amd6 as a GuestOS. One of the reason why BHyVe cannot support other OSes is lack of BIOS support.
ARM Virtualization: CPU & MMU Issues
ARM Virtualization: CPU & MMU Issues Prashanth Bungale, Sr. Member of Technical Staff 2010 VMware Inc. All rights reserved Overview Virtualizability and Sensitive Instructions ARM CPU State Sensitive Instructions
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Virtualization. Mike Kasick Glenn Willen Mike Cui. April 16, 2007. 15-410: Operating System Design & Implementation
Virtualization Mike Kasick Glenn Willen Mike Cui 15-410: Operating System Design & Implementation April 16, 2007 Outline 1 Introduction 2 Virtualization 3 x86 Virtualization 4 Alternatives for Isolation
Chapter 5 Cloud Resource Virtualization
Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.
Virtualization in Linux KVM + QEMU
CS695 Topics in Virtualization and Cloud Computing KVM + QEMU Senthil, Puru, Prateek and Shashank 1 Topics covered KVM and QEMU Architecture VTx support CPU virtualization in KMV Memory virtualization
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
System Virtual Machines
System Virtual Machines Introduction Key concepts Resource virtualization processors memory I/O devices Performance issues Applications 1 Introduction System virtual machine capable of supporting multiple
Virtualization Concepts And Applications. Yash Jain DA-IICT (DCOM Research Group)
Virtualization Concepts And Applications Yash Jain DA-IICT (DCOM Research Group) Virtualization Virtualization is a framework or methodology of dividing the resources of a computer into multiple execution
Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361
s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines
Virtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. !
Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
12. Introduction to Virtual Machines
12. Introduction to Virtual Machines 12. Introduction to Virtual Machines Modern Applications Challenges of Virtual Machine Monitors Historical Perspective Classification 332 / 352 12. Introduction to
Virtual machines and operating systems
V i r t u a l m a c h i n e s a n d o p e r a t i n g s y s t e m s Virtual machines and operating systems Krzysztof Lichota [email protected] A g e n d a Virtual machines and operating systems interactions
Intro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
Nested Virtualization
Nested Virtualization Dongxiao Xu, Xiantao Zhang, Yang Zhang May 9, 2013 Agenda Nested Virtualization Overview Dive into Nested Virtualization Details Nested CPU Virtualization Nested MMU Virtualization
Hypervisors and Virtual Machines
Hypervisors and Virtual Machines Implementation Insights on the x86 Architecture DON REVELLE Don is a performance engineer and Linux systems/kernel programmer, specializing in high-volume UNIX, Web, virtualization,
Virtualization Technology. Zhiming Shen
Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became
How To Understand The Power Of A Virtual Machine Monitor (Vm) In A Linux Computer System (Or A Virtualized Computer)
KVM - The kernel-based virtual machine Timo Hirt [email protected] 13. Februar 2010 Abstract Virtualization has been introduced in the 1960s, when computing systems were large and expensive to operate. It
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
CS5460: Operating Systems. Lecture: Virtualization 2. Anton Burtsev March, 2013
CS5460: Operating Systems Lecture: Virtualization 2 Anton Burtsev March, 2013 Paravirtualization: Xen Full virtualization Complete illusion of physical hardware Trap _all_ sensitive instructions Virtualized
UEFI Hypervisors Winning the Race to Bare Metal
UEFI Hypervisors Winning the Race to Bare Metal Don Bailey Hypervista Technologies Herndon, VA 20170 USA +001 703 582 1277 [email protected] Black Hat Conference Proceedings 2008 Abstract. Improvements
Virtualization. Explain how today s virtualization movement is actually a reinvention
Virtualization Learning Objectives Explain how today s virtualization movement is actually a reinvention of the past. Explain how virtualization works. Discuss the technical challenges to virtualization.
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Introduction to Virtualization
Introduction to Virtualization Dr. Qingni Shen Peking University Intel UPO Supported Main Points Status and trends in data center Definition of virtualization Common types of virtualization Key technologies
COM 444 Cloud Computing
COM 444 Cloud Computing Lec 3: Virtual Machines and Virtualization of Clusters and Datacenters Prof. Dr. Halûk Gümüşkaya [email protected] [email protected] http://www.gumuskaya.com Virtual
Distributed and Cloud Computing
Distributed and Cloud Computing K. Hwang, G. Fox and J. Dongarra Chapter 3: Virtual Machines and Virtualization of Clusters and datacenters Adapted from Kai Hwang University of Southern California March
OS Virtualization. CSC 456 Final Presentation Brandon D. Shroyer
OS Virtualization CSC 456 Final Presentation Brandon D. Shroyer Introduction Virtualization: Providing an interface to software that maps to some underlying system. A one-to-one mapping between a guest
matasano Hardware Virtualization Rootkits Dino A. Dai Zovi
Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda Introductions Virtualization (Software and Hardware) Intel VT-x (aka Vanderpool ) VM Rootkits Implementing a VT-x based Rootkit Detecting Hardware-VM
Intel Virtualization Technology and Extensions
Intel Virtualization Technology and Extensions Rochester Institute of Technology Prepared and Presented by: Swapnil S. Jadhav (Computer Engineering) Chaitanya Gadiyam (Computer Engineering) 1 Agenda Virtualization
Virtualization Technology. Zhonghong Ou Data Communications Software Lab, Aalto University
Virtualization Technology Zhonghong Ou Data Communications Software Lab, Aalto University 1 Definition Virtualization refers to a concept in which access to a single underlying piece of hardware, like
A Unified View of Virtual Machines
A Unified View of Virtual Machines First ACM/USENIX Conference on Virtual Execution Environments J. E. Smith June 2005 Introduction Why are virtual machines interesting? They allow transcending of interfaces
Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool
Outline CS 6V81-05: System Security and Malicious Code Analysis Overview of System ization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
The Art of Virtualization with Free Software
Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike
Cloud Computing. Up until now
Cloud Computing Lecture 11 Virtualization 2011-2012 Up until now Introduction. Definition of Cloud Computing Grid Computing Content Distribution Networks Map Reduce Cycle-Sharing 1 Process Virtual Machines
A Survey on Virtualization Technologies
A Survey on Virtualization Technologies Susanta Nanda Tzi-cker Chiueh {susanta,chiueh}@cs.sunysb.edu Department of Computer Science SUNY at Stony Brook Stony Brook, NY 11794-4400 Abstract Virtualization
Models For Modeling and Measuring the Performance of a Xen Virtual Server
Measuring and Modeling the Performance of the Xen VMM Jie Lu, Lev Makhlis, Jianjiun Chen BMC Software Inc. Waltham, MA 2451 Server virtualization technology provides an alternative for server consolidation
Intel Virtualization Technology Overview Yu Ke
Intel Virtualization Technology Overview Yu Ke SSG System Software Division Agenda Virtualization Overview Intel Virtualization Technology 2 What is Virtualization VM 0 VM 1 VM n Virtual Machines (VMs)
Virtual Machines. Virtualization
Virtual Machines Marie Roch Tanenbaum 8.3 contains slides from: Tanenbaum 3 rd ed. 2008 1 Virtualization Started with the IBM System/360 in the 1960s Basic concept simulate multiple copies of the underlying
Virtual Machines. www.viplavkambli.com
1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software
Introduction to Virtual Machines
Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity
Clouds, Virtualization and Security or Look Out Below
Clouds, Virtualization and Security or Look Out Below Lee Badger Hardware Virtualization (Box View) 1 2 dom0 HW type 1 Para-virtualization I/O Host HW type 2 dom0 HW type 1 Full virtualization I/O Host
Virtualization Technologies
12 January 2010 Virtualization Technologies Alex Landau ([email protected]) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on
Analysis of the Intel Pentium s Ability to Support a Secure Virtual Machine Monitor
Analysis of the Intel Pentium s Ability to Support a Secure Virtual Machine Monitor John Scott Robin U.S. Air Force scott robin @hotmail.com Cynthia E. Irvine Naval Postgraduate School [email protected]
x86 ISA Modifications to support Virtual Machines
x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization
Distributed Systems. Virtualization. Paul Krzyzanowski [email protected]
Distributed Systems Virtualization Paul Krzyzanowski [email protected] Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Virtualization
Virtualization. 2010 VMware Inc. All rights reserved
Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D. Rodgers Intel Virtualization Technology
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Introduction Have been around
Xen and the Art of Virtualization
Xen and the Art of Virtualization Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauery, Ian Pratt, Andrew Warfield University of Cambridge Computer Laboratory, SOSP
Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006
Rich Uhlig, et.al, Intel Virtualization Technology, Computer, published by the IEEE Computer Society, Volume 38, Issue 5, May 2005. Pages 48 56. Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006 Outline of
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
Cloud Computing #6 - Virtualization
Cloud Computing #6 - Virtualization Main source: Smith & Nair, Virtual Machines, Morgan Kaufmann, 2005 Today What do we mean by virtualization? Why is it important to cloud? What is the penalty? Current
Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:
Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique
VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
Hardware Assisted Virtualization Intel Virtualization Technology
Hardware Assisted Virtualization Intel Virtualization Technology Matías Zabaljáuregui [email protected] Buenos Aires, Junio de 2008 1 Index 1 Background, motivation and introduction to Intel Virtualization
x86 Virtualization Hardware Support Pla$orm Virtualiza.on
x86 Virtualization Hardware Support Pla$orm Virtualiza.on Hide the physical characteris.cs of computer resources from the applica.ons Not a new idea: IBM s CP- 40 1967, CP/CMS, VM Full Virtualiza.on Simulate
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
Analysis of Virtualization Tools and Techniques
Analysis of Virtualization Tools and Techniques Mrs. Kavita S. 1, Mrs. Dakshyani G. 2, Mrs. Kiruthika 3 Assistant Professor, Department of Computer Engineering, FCRIT, Vashi, Navi Mumbai, India 1,2 Associate
Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...
Contents Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...3 The Challenges of x86 Hardware Virtualization...3 Technique 1 - Full Virtualization using Binary Translation...4 Technique
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
Enterprise-Class Virtualization with Open Source Technologies
Enterprise-Class Virtualization with Open Source Technologies Alex Vasilevsky CTO & Founder Virtual Iron Software June 14, 2006 Virtualization Overview Traditional x86 Architecture Each server runs single
KVM: A Hypervisor for All Seasons. Avi Kivity [email protected]
KVM: A Hypervisor for All Seasons Avi Kivity [email protected] November 2007 Virtualization Simulation of computer system in software Components Processor: register state, instructions, exceptions Memory
kvm: the Linux Virtual Machine Monitor
Avi Kivity Qumranet [email protected] kvm: the Linux Virtual Machine Monitor Uri Lublin Qumranet [email protected] Yaniv Kamay Qumranet [email protected] Dor Laor Qumranet [email protected] Anthony
Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition
Chapter 16: Virtual Machines Silberschatz, Galvin and Gagne 2013 Chapter 16: Virtual Machines Overview History Benefits and Features Building Blocks Types of Virtual Machines and Their Implementations
The NOVA Microhypervisor
The NOVA Microhypervisor Germany Microprocessor Lab, Intel Labs Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL
Introduction to Virtual Machines
Introduction to Virtual Machines Carl Waldspurger (SB SM 89, PhD 95), VMware R&D 2010 VMware Inc. All rights reserved Overview Virtualization and VMs Processor Virtualization Memory Virtualization I/O
Xen and the Art of. Virtualization. Ian Pratt
Xen and the Art of Virtualization Ian Pratt Keir Fraser, Steve Hand, Christian Limpach, Dan Magenheimer (HP), Mike Wray (HP), R Neugebauer (Intel), M Williamson (Intel) Computer Laboratory Outline Virtualization
kvm: Kernel-based Virtual Machine for Linux
kvm: Kernel-based Virtual Machine for Linux 1 Company Overview Founded 2005 A Delaware corporation Locations US Office Santa Clara, CA R&D - Netanya/Poleg Funding Expertise in enterprise infrastructure
Virtual Machines. Adapted from J.S. Smith and R. Nair, VIRTUAL MACHINES, Morgan-Kaufmann 2005. Teodor Rus. [email protected]
Virtual Machines Adapted from J.S. Smith and R. Nair, VIRTUAL MACHINES, Morgan-Kaufmann 2005 Teodor Rus [email protected] The University of Iowa, Department of Computer Science Introduction to System Software
nanohub.org An Overview of Virtualization Techniques
An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource
Implementation of a Purely Hardware-assisted VMM for x86 Architecture
Implementation of a Purely Hardware-assisted VMM for x86 Architecture Saidalavi Kalady, Dileep P G, Krishanu Sikdar, Sreejith B S, Vinaya Surya, Ezudheen P Abstract Virtualization is a technique for efficient
How To Virtualize A Computer System
CHAPTER Virtual Machines and Virtualization of Clusters and Data Centers 3 CHAPTER OUTLINE Summary...130 3.1 Implementation Levels of Virtualization...130 3.1.1 Levels of Virtualization Implementation..............................................
Intel Virtualization Technology Specification for the IA-32 Intel Architecture
Intel Virtualization Technology Specification for the IA-32 Intel Architecture C97063-002 April 2005 THIS DOCUMENT AND RELATED MATERIALS AND INFORMATION ARE PROVIDED AS IS WITH NO WARRANTIES, EXPRESS OR
Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones ([email protected]) May 2011
Cloud^H^H^H^H^H Virtualization Technology Andrew Jones ([email protected]) May 2011 Outline Promise to not use the word Cloud again...but still give a couple use cases for Virtualization Emulation it's
The Microsoft Windows Hypervisor High Level Architecture
The Microsoft Windows Hypervisor High Level Architecture September 21, 2007 Abstract The Microsoft Windows hypervisor brings new virtualization capabilities to the Windows Server operating system. Its
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
FRONT FLYLEAF PAGE. This page has been intentionally left blank
FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to
Virtual Machines. Virtual Machine (VM) Examples of Virtual Systems. Types of Virtual Machine
1 Virtual Machines Virtual Machine (VM) Layered model of computation Software and hardware divided into logical layers Layer n Receives services from server layer n 1 Provides services to client layer
Hybrid Virtualization The Next Generation of XenLinux
Hybrid Virtualization The Next Generation of XenLinux Jun Nakajima Principal Engineer Intel Open Source Technology Center Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Performance Profiling in a Virtualized Environment
Performance Profiling in a Virtualized Environment Jiaqing Du EPFL, Switzerland Nipun Sehrawat IIT Guwahati, India Willy Zwaenepoel EPFL, Switzerland Abstract Virtualization is a key enabling technology
Hardware Based Virtualization Technologies. Elsie Wahlig [email protected] Platform Software Architect
Hardware Based Virtualization Technologies Elsie Wahlig [email protected] Platform Software Architect Outline What is Virtualization? Evolution of Virtualization AMD Virtualization AMD s IO Virtualization
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
Virtualization and the U2 Databases
Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization
4-2 A Load Balancing System for Mitigating DDoS Attacks Using Live Migration of Virtual Machines
4-2 A Load Balancing System for Mitigating DDoS Attacks Using Live Migration of Virtual Machines ANDO Ruo, MIWA Shinsuke, KADOBAYASHI Youki, and SHINODA Yoichi Recently, rapid advances of CPU processor
Cloud Computing. Dipl.-Wirt.-Inform. Robert Neumann
Cloud Computing Dipl.-Wirt.-Inform. Robert Neumann Pre-Cloud Provisioning Provisioned IT Capacity Load Forecast IT Capacity Overbuy Underbuy Fixed Cost for Capacity Investment Hurdle Real Load Time 144
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
Multi-core Programming System Overview
Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,
