Platform Virtualization: Model, Challenges and Approaches



Similar documents
Virtualization. Jia Rao Assistant Professor in CS

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization

Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

COS 318: Operating Systems. Virtual Machine Monitors

Virtualization. Jukka K. Nurminen

Brian Walters VMware Virtual Platform. Linux J. 1999, 63es, Article 6 (July 1999).

ARM Virtualization: CPU & MMU Issues

Full and Para Virtualization

Virtualization. Mike Kasick Glenn Willen Mike Cui. April 16, : Operating System Design & Implementation

Chapter 5 Cloud Resource Virtualization

Virtualization in Linux KVM + QEMU

Virtualization. Pradipta De

System Virtual Machines

Virtualization Concepts And Applications. Yash Jain DA-IICT (DCOM Research Group)

Virtual Machines. COMP 3361: Operating Systems I Winter

Virtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. !

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

12. Introduction to Virtual Machines

Virtual machines and operating systems

Intro to Virtualization

Nested Virtualization

Hypervisors and Virtual Machines

Virtualization Technology. Zhiming Shen

How To Understand The Power Of A Virtual Machine Monitor (Vm) In A Linux Computer System (Or A Virtualized Computer)

Virtualization. Dr. Yingwu Zhu

CS5460: Operating Systems. Lecture: Virtualization 2. Anton Burtsev March, 2013

UEFI Hypervisors Winning the Race to Bare Metal

Virtualization. Explain how today s virtualization movement is actually a reinvention

Virtualization. Types of Interfaces

Introduction to Virtualization

COM 444 Cloud Computing

Distributed and Cloud Computing

OS Virtualization. CSC 456 Final Presentation Brandon D. Shroyer

matasano Hardware Virtualization Rootkits Dino A. Dai Zovi

Intel Virtualization Technology and Extensions

Virtualization Technology. Zhonghong Ou Data Communications Software Lab, Aalto University

A Unified View of Virtual Machines

Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool

The Art of Virtualization with Free Software

Cloud Computing. Up until now

A Survey on Virtualization Technologies

Models For Modeling and Measuring the Performance of a Xen Virtual Server

Intel Virtualization Technology Overview Yu Ke

Virtual Machines. Virtualization

Virtual Machines.

Introduction to Virtual Machines

Clouds, Virtualization and Security or Look Out Below

Virtualization Technologies

Analysis of the Intel Pentium s Ability to Support a Secure Virtual Machine Monitor

x86 ISA Modifications to support Virtual Machines

Distributed Systems. Virtualization. Paul Krzyzanowski

Virtualization VMware Inc. All rights reserved

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

COS 318: Operating Systems. Virtual Machine Monitors

Xen and the Art of Virtualization

Jukka Ylitalo Tik TKK, April 24, 2006

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Cloud Computing #6 - Virtualization

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

Hardware Assisted Virtualization Intel Virtualization Technology

x86 Virtualization Hardware Support Pla$orm Virtualiza.on

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Analysis of Virtualization Tools and Techniques

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

Enterprise-Class Virtualization with Open Source Technologies

KVM: A Hypervisor for All Seasons. Avi Kivity avi@qumranet.com

kvm: the Linux Virtual Machine Monitor

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition

The NOVA Microhypervisor

Introduction to Virtual Machines

Xen and the Art of. Virtualization. Ian Pratt

kvm: Kernel-based Virtual Machine for Linux

Virtual Machines. Adapted from J.S. Smith and R. Nair, VIRTUAL MACHINES, Morgan-Kaufmann Teodor Rus.

nanohub.org An Overview of Virtualization Techniques

Implementation of a Purely Hardware-assisted VMM for x86 Architecture

How To Virtualize A Computer System

Intel Virtualization Technology Specification for the IA-32 Intel Architecture

Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones May 2011

The Microsoft Windows Hypervisor High Level Architecture

Chapter 14 Virtual Machines

FRONT FLYLEAF PAGE. This page has been intentionally left blank

Virtual Machines. Virtual Machine (VM) Examples of Virtual Systems. Types of Virtual Machine

Hybrid Virtualization The Next Generation of XenLinux

Performance Profiling in a Virtualized Environment

Hardware Based Virtualization Technologies. Elsie Wahlig Platform Software Architect

Compromise-as-a-Service

Virtualization and the U2 Databases

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

4-2 A Load Balancing System for Mitigating DDoS Attacks Using Live Migration of Virtual Machines

Cloud Computing. Dipl.-Wirt.-Inform. Robert Neumann

9/26/2011. What is Virtualization? What are the different types of virtualization.

Multi-core Programming System Overview

Transcription:

Platform Virtualization: Model, Challenges and Approaches Fangzhou Jiao, Yuan Luo School of Informatics and Computing Indiana University {fjiao, yuanluo}@indiana.edu

Outlines Virtualization Overview Virtualization Models Formal Definition of Virtualization: Popek and Goldberg s Virtualization Requirements Overview of x86 Virtualization: Obstacles and Solutions Virtualization on the move 2

Virtualization Overview What s Virtualization? Why Virtualization? 3

What s Virtualization Virtualization is a technology that combines or divides (computing) resources to present one or many operating environments. 4

Virtualization: What is it, really? Virtualization using methodologies such as, Hardware/software partitioning (or aggregation) Partial or complete machine simulation Emulation (again, can be partial or complete) Time-sharing (in fact, sharing in general) In general, can be M-to-N mapping (M real resources, N virtual resources) Examples: VM (M-N), Grid Computing (M-1), Multitasking (1-N) 5

Virtualization Everywhere Driver Gas Machine Gas Station Attendants Gas Pump 6

Virtualization: Any demands? Server consolidation Application Consolidation Sandboxing Multiple execution environments Virtual hardware Debugging Software migration (Mobility) Appliance (software) Testing/Quality Assurance 7

The Traditional Server Concept Web Server App Server DB Server EMail Windows Linux Linux Windows IIS Glassfish MySQL Exchange 8

And if something goes wrong... Web Server App Server DB Server EMail Windows DOWN! Linux Windows IIS MySQL Exchange 9

The Traditional Server Concept Pros Easy to conceptualize Fairly easy to deploy Easy to backup Virtually any application/service can be run from this type of setup Cons Expensive to acquire and maintain hardware Not very scalable Difficult to replicate Redundancy is difficult to implement In many cases, processor is under-utilized 10

The Virtual Server Concept Virtual Machine Monitor (VMM) layer between Guest OS and hardware 11

The Virtual Server Concept Pros Resource pooling Highly redundant Highly available Rapidly deploy new servers Easy to deploy Reconfigurable while services are running Optimizes physical resources by doing more with less Cons Slightly harder to conceptualize Slightly more costly (must buy hardware, OS, Apps, and now the abstraction layer) BACK 12

Virtualization Abstraction Levels Instruction Set Architecture (ISA) Emulate the ISA in software Interprets, translates to host ISA (if required) Device abstractions implemented in software Inefficient Optimizations: Caching, Code reorganization Applications: Debugging, Teaching, multiple OS Hardware Abstraction Layer (HAL) Between real machine and emulator (maps to real hardware) Handling non-virtualizable architectures (code scanning, dynamic instruction rewriting) Applications: Fast and usable, virtual hardware, consolidation, migration. 13

Virtualization Abstraction Levels cont d Operating System Level Virtualized SysCall Interface (may be same) May or may not provide all the device abstractions Easy to manipulate (create, configure, destroy) Library (user-level API) Level Presents a different subsystem API to application Complex implementation, if kernel API is limited User-level device drivers Application (Programming Language) Level Virtual architecture (ISA, registers, memory, ) Platform-independence (highly portable) Less control on the system (extremely high-level) 14

Overall Picture ISA HAL OS Library PL Performance * **** **** *** ** Flexibility **** *** ** ** ** Ease of Implementation Degree of Isolation ** * *** ** ** *** **** ** ** *** (more stars are better) 15

Instruction Set Architecture Level Virtualization Technologies Emulation: Translates guest ISA to native ISA Translation Cache: Optimizes emulation by making use of similar recent instructions Code rearrangement Speculative scheduling (alias hardware) Issues Efficient Exception handling Self-modifying code 16

ISA Level Virtualization: Examples Bochs: Open source x86 emulator Emulates whole PC environment x86 processor and most of the hardware (VGA, disk, keyboard, mouse, ) Custom BIOS, emulation of power-up, reboot Host ISAs: x86, PowerPC, Alpha, Sun, and MIPS Crusoe (Transmeta) Code morphing engine dynamic x86 emulator on VLIW processor 16 MB memory as translation cache Shadow registers: Enables easy exception handling QEMU: User space only, and full system emulation Multiple target ISAs: x86, ARM, PowerPC, Sparc Full-software MMU and simulation(using mmap() system call) Dynamic Translation 17

HAL Virtualization Techniques Standalone vs. Hosted Drivers Host and VMM worlds I/O Protection Rings Multilevel privilege domains Handling silent fails Scan code and insert/replace artificial traps 18

Intel x86 Protection Rings 19

Paravirtualization Traditional architectures do not scale Interrupt handling Memory management World switching Virtualized architecture interface Much simpler architectural interface Virtual I/O and CPU instructions, registers, Portability is lost 20

Examples Denali Xen 21

Programming Level Virtualization Java Virtual Machine (JVM) Executes Java byte code (virtual instructions) Provides the implementation for the instruction set interpreter (or JIT compiler) Provides code verification, garbage collection, etc Hardware access through underlying OS JVM Architecture Stack-based architecture No MMU Virtual hardware: PC, register-set, heap, method (code) areas Rich instruction set Direct object manipulation, type conversion, exception throws Provides a runtime environment through JRE Other Examples:.NET CLI, Parrot (PERL 6) BACK 22

Virtual Machine Implementation: Issues Only one bare machine interface to guest system! What architectures are considered as virtualizable? A virtualizable architecture allows any instruction inspecting/modifying machine state to be trapped when executed in any but the most privileged mode - Popek & Goldberg (1974) What about x86 machines? BACK 23

x86 Virtualization: Obstacles and Solutions

Processor Virtualization Goal of processor virtualization: 25

Processor Virtualization Goal of processor virtualization: Identical environment and behavior with physical machine. Efficiency: most instructions should be directly executed by processor. Control to resource: i. Isolation of resources; ii. Hypervisor can gain control for allocated resources if needed. 26

Processor Virtualization These goals needs instruction set support. What features of modern processors can contribute to these goals of virtualization? 27

Processor Virtualization Privilege Levels: Hypervisor should run in higher privilege level than guest OS. Memory protection system: Virtual memory: offered address isolation And more? 28

Processor Virtualization First we define the sensitive instructions 29

Processor Virtualization First we define the sensitive instructions Sensitive instructions: Instructions which can interfere the global status of system. 30

Processor Virtualization 1. Instructions which changes or references the state of VM or machine. 2. Instructions which changes or reads the sensitive register or memory location. 3. Instructions which changes or references the memory protection system. 4. Instructions which execution results depends on the state of machine, or memory protection system, or privilege level. 31

Processor Virtualization Popek and Goldberg s virtualization requirements: If all the sensitive instructions were privileged, the instruction set is ready for virtualization. What about x86 instructions? 32

Obstacles of x86 Virtualization Instructions involved sensitive registers: SGDT, SIDT, SLDT SMSW PUSHF, POPF 33

Obstacles of x86 Virtualization Sensitive Registers GDTR (Global descriptor table register) IDTR (Interrupt descriptor table register) LDTR (Local descriptor table register) Store segment descriptors which containing base address, type, length and access rights for memory segments. 34

Obstacles of x86 Virtualization GDTR, IDTR, LDTR Typically, x86 processors only have one register of these three. But each virtual machine needs to keep the segmentation information of themselves. When all guest OS sharing one segment register, the guest OS may see the segment descriptor of other guest OS or hypervisor, since the segment register only can be loaded in CPL 0. MSW register Fangzhou similar Jiao & with Yuan Luo this. 35

Obstacles of x86 Virtualization Instructions: SMSW, PUSHF, POPF SMSW, PUSHF: Executing these two instructions involved checking the content of sensitive registers (CR0, EFLAGS) So the guest OS is able to found it was running in virtual machine. 36

Obstacles of x86 Virtualization Ambiguous result in different privilege ring: POPF (Push/pop EFLAGS) Different bits in EFLAGS have different write privilege levels. Guest OS usually not executing in CPL 0, so POPF will not raise exception not trapped, only generated results without modify some bits in EFLAGS. 37

Obstacles of x86 Virtualization Instructions which result relies on memory protection system or privilege level: LAR, LSL, VERR, VERW POP, PUSH CALL, JUMP, INT, RET MOVE 38

Obstacles of x86 Virtualization When a guest OS executing such instructions, it is possible for discovering itself was not running in CPL=0, thus the guest OS will not execute properly. 39

Instruction Sensitive Privileged Violated Source Destination Semantic Explanation Rules SGDT Y N 3B [Register] GDTR Memory Store The registers GDTR, LDTR, IDTR, and CR0, SIDT Y N 3B [Register] IDTR Memory / Store EFLAGS should be maintained as different Register registers for different VMs. So the operations to SLDT Y N 3B [Register] LDTR Memory Store these registers could lead to result that one VM modified other VM's state. SMSW Y N 3B [Register] CR0 Memory / Store Register SMSW Y N 3B [Register] CR0 Memory / Register Store PUSHF Y Ambiguous 3B [Register] EFLAGS Stack Push stack POPF Y Ambiguous 3B Stack [Register] Pop stack EFLAGS Still involved registers should be per-vm. Also these instructions can be executed when have no enough privilege, but the whole system was left as an ambiguous state. LAR Y N 3C Segment Descriptor [Register] GP Load (Access Rights) LSL Y N 3C Segment [Register] GP Load (Segment Descriptor Limit) VERR Y N 3C Segment N/A Verify (Readable) Descriptor VERW Y N 3C Segment N/A Verify (Writable) Descriptor POP Y N 3C Stack [Register] GP Pop stack PUSH Y N 3C Stack [Register] GP Push stack Execution of these instructions involved checking the CPL. The result relies on the CPL. In guest OS the CPL could be different with the OS expected, so there would be trouble. CALL Y N 3C Call subroutine Only cross privilege level calls are sensitive. JMP Y N 3C Jump to Croo privilege level calls involved a lot of CPL check. INT Y N 3C Interrupt RET Y N 3C Return STR Y N 3C Task Register [Register] Store [Segment Selector] GP/Memory MOVE Y N 3C Move When CS or SS register involved, the CPL bits in CS or SS can be referenced or updated, and the guest OS can found inconsistency in CPL.

Obstacles of x86 Virtualization: Memory Management For each virtual machine, the address should be maintained independently and isolated. 40

Obstacles of x86 Virtualization: Memory Management So in virtualized system, two level address translation were needed: Guest Virtual Address to Guest Physical Address Guest Physical Address to Native Physical Address 41

Obstacles of x86 Virtualization: Memory Management Traditional solution: Shadow page tables MMU was not aware of the exist of shadow page table So we need generate page fault to update the TLB to keep it updated with both page tables 42

Obstacles of x86 Virtualization: Memory Management Shadow Page Table and Guest Page Table Address Translation Guest Page Table Guest Virtual Address to Guest Physical Address Shadow Page Table Guest Physical Address to Native Physical Address Visible Guest Hypervisor Updated by Guest Hypervisor Numbers Per VM Per VM 43

Obstacles of x86 Virtualization x86 machines cannot satisfy the virtualization requirement... So how to cope with these obstacles of x86 virtualization? 44

x86 Virtualization: Traditional approach First one and the older one: Binary translation The virtual machine monitoring all the instructions executed by guest OS, when founding a sensitive instruction, it executes a series of dynamic generated instructions instead of directly execute the original sensitive instruction. 45

x86 Virtualization: Traditional approach Another, quite new solution: Paravirtualization Modify the guest operating system, replace the sensitive operations with virtualization-safe routines. 46

Processor Virtualization Limitations of traditional approach Binary translation Paravirtualization Performance Relatively Low Faster Guest OS Portability Need not modify Guest OS Guest OS should be rewrite 47

Processor Virtualization One major advantage of x86 platform is plenty of software. Modify the instruction set of x86 for better support to virtualization is not practical considering the legacy software. So what can we do..? 48

x86 Virtualization: New approach Intel VT and AMD-V: Hardware assisted x86 virtualization. 49

x86 Virtualization: New approach New processor states: VMX non-root operation mode: for guest OS VMX root operation mode: for hypervisor State transition between these two state were assisted by hardware 50

x86 Virtualization: New approach Example of VMX instructions 1. VMCALL: This simply calls the VM monitor, causing the VM to exit. 2. VMCLEAR: copies VMCS data to memory in case it is written there 3. VMLAUNCH: launches a virtual machine, and changes the launch state of the VMCS to be launched, if it is clear. 4. VMPTRLD: loads a pointer to the VMCS. 5. VMPTRST: stores a pointer to the VMCS. 6. VMREAD: read specified field from VMCS. 7. VMRESUME: resumes a virtual machine. 8. VMWRITE: write specified field in VMCS. 9. VMXOFF: terminates VMX operation. 10. VMXON: starts VMX operation. 51

x86 Virtualization: New approach VMCS: Virtual Machine Control Structure Guest Area: Per-VM information, included the sensitive registers (CRs, DRs, RSP/RIP/RFLAGS, Segment registers, MSR) and other non-register states. Host Area: Sensitive registers, and other machine states which belongs to hypervisor. BACK 52

x86 Virtualization: New approach MMU Virtualization: Nested page table MMU knows the exist of shadow page tables, MMU handled gpa->npa translation BACK 53

Brief overview to x86 Virtualization: Obstacles and Solutions Popek and Goldberg s Ideal Virtual Machine Characteristics Obstacles to virtualization in x86 architecture Traditional solutions New solution: Hardware-assisted x86 virtualization Identical environment with physical machine Many instructions need to check CPL (Current Privilege Level), so a Guest OS is able to found it was running in a virtual machine since it could found the CPL is not in 0, which is the privilege level for operating system kernels. Or some instructions could have ambiguous result when executed in different CPLs. The Hypercalls : modify guest OS to make it can communicate with hypervisor explicitly; or binary translation New processor modes: VMX Root operations and VMX Non-root operations. You can just think it as Privilege Level -1, like a new privilege level for hypervisors. Efficiently execution of virtual machine Circumventing other obstacles can lead to serious performance downgrade Hypercalls can reduce the overhead of binary translation, however it need to modify guest OS. Hardware based state transition between guest state (VMX Non-root) and hypervisor state (VMX Root). When sensitive instructions were encountered, the processor automatically signals the hypervisor to handle it. Resource Control: VMM complete control to resources and Resource isolation between different guest OS. Memory virtualization: Guest physical address space should be isolated for different guest operating systems. Just like an additional level of virtual memory. However the performance could be lower since it caused more TLB miss and page faults. Shadow page tables, etc. Nested page tables(aka EPT for Intel): CR3 become a per-vm register and can be automatically switched when switching between different guest OS. Guest physical to hypervisor physical address translation were managed by hardware MMU. Guest OS now can perform address translation transparently, without too much overhead. Virtual machines were considered as Logical processors, so some processor state should be kept as per-vm manner, like segmentation registers, flag registers, machine state word, etc. However x86 only have one register for these sensitive registers, this could lead to the violation of resource isolation. Use binary translation, Hypercalls to implement the save and load of guest states. VMCS: Virtual Machine Control Structure For tracking each guest OS s private state. And can be automatically switched when context switching between different guest OS.

Virtualization: on the move BACK 54

Virtualization on the move GPU virtualization? GPU is used more and more in HPC Allocate the computing resources of GPU more efficiently. Virtualization as resource integration? m physical machines to 1 or n (n<=m) virtual machines? ScaleMP BACK 55

References [1] POPEK, G. J., AND GOLDBERG, R. P., Formal requirements for virtualizable third generation architectures. Commun. ACM 17, 7 (1974), 412 421. [2] J. S. Robin and C. E. Irvine, Analysis of the Intel Pentium's ability to support a secure virtual machine monitor. In Proceedings of the 9th USENIX Security Symposium, Denver, CO, USA, pages 129--144, Aug. 2000. [3] Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield, Xen and the art of virtualization. In Proceedings of the nineteenth ACM symposium on Operating Systems Principles (SOSP19), pages 164-177. ACM Press, 2003. [4] Keith Adams, Ole Agesen, A Comparison of Software and Hardware Techniques for x86 Virtualization. ASPLOS 06 [5] NEIGER, G., SANTONI, A., LEUNG, F.,RODGERS, D., AND UHLIG, R., Intel virtualization technology: Hardware support for efficient processor virtualization. Intel Technology Journal 10, 3 (2006). [6] INTEL CORPORATION. Intel Virtualization Technology Specification for the IA-32 Intel R Architecture, April 2005 [7] Advanced Micro Devices, Inc. White paper on AMD-V Nested Paging, Rev. 1.0, July, 2008 [8] Susanta Nanda, Tzi-cker Chiueh, A Survey on Virtualization Technologies. RPE Report, pages 1 42, 2005. [9] I. Pratt et al, Xen 3.0 and the Art of Virtualization. In Proc. of the Ottawa Linux Symposium, 2005. [10] VMWare, Inc. Understanding full virtualization, paravirtualization, and hardware assist. http://www.vmware.com/files/pdf/vmware/paravirtualization.pdf, 2007. [11] A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori. kvm: the Linux virtual machine monitor. In OLS 07: The 2007 Ottawa Linux Symposium, pages 225 230, July 2007. 56

Thank You! 57