You are on page 1of 10
i} VIRTUALIZATION OF CPU A vvW & a duplicate op an existing compuee? —— system in which a majority op the Vit instruc ons are exewteol on the host processor In native mode. Tus» unpAvilegect instructions op VMs von directly on the host machine sor higher epi leny - other critecal tnshuctons should be handled caroolly for correctness and stabilcty - The ertteal msbuctons are divided into three categories » previlegedt instru -cttons , control - sensitive instruckons, anck behavtovr— sensitive |nstrocktors . Privileged tnstoctions execute ina privilege mode and will be trapped wp axtewbed gubide ths moglo - Qntrel- Instructions shnstet ve actempts to change the conriguration of resources used. Behaviour sensitive Instruction hove ayoent behaviours aponding on the congigy ~racion op vesoortes , Including the load and sfore operadione ovey the virfoal memory. | Pie @ A cro arthifeclvre is weoduzable i supports the ability to run the UMs privileged and enprivilegeol inshructions in the CPU's user ~— moda while the VM run [7 supervisor mode. when the privileged ins fruckéons incding control - and behaviour - sensitive inshuction o AVH aye execwteol , they are (rapped 1p the VHM . in this case, thy VMM ack asa. untpjed mediator {2 hardware acess from dipperent vis to guaranties the correctness and stability of te whoe system However, not all cru arth! ectyres ise ave virtvatizable . cru architectures can be natoratly virtualized because aif contro! - and behaviour -sensitive instructions aye frtvelegedt cashutttons On the contrary *% CPO architectures are not primarily designed to sopport virtvalizatrsy This ts because about io sensttve inshucttons such as soor ahd smsw are nok privileged Instrocttons on a native Mx -lke system » a after Galt trigger the 90h interropt and passes confrol 4p the os fernel- The interrypt fhanday (" the kernel rc then invoked fo (rocess the system all .on a para -virteali zaGon system as Xen , a system cal) tn Ho que SE Os gine friggeys the gob inderrypt pormally . Almost at the same time , the sgoh Interrupt in the Aypervisor (s treogored Lneidan tally » contro] “és Passed on fo to Aypervicor @s well. when the — hypervisor completes fs task for the quest os system call, it pases confrol batt to the quest 0s kerne/ . Grtainly 1 he quest os kerro/ may alo ¢nyoke the fyperca/ yonning. Although paravitoalizatio op a CPU ek unm oolieted applicati one rop 10 tHe uM, © causes Penalty . while — jf'% a smaly Ppopounane @ Hardware - Assis€ed CPU vivtvalrzation This technique attemph fo simplpg virtualization Because pull or paravirtoalezation ts compliated. Intel and AM? add ap additional mode called privitege mode feve/ to X86 processors - Therepore , operating systems can sk yon at ving 0 and the hypenttor can von a& RIng-1 . All the privileged and sersitive tastrocttons are trapped in te hypervisor automatically . th; technique yemoves the dipgiolty op templementing binasy prantlatron of fell virkvatezation - Te also (eB the operating systarr von in VMs cutthout hod teatton « oO VIRTUALIZATION OF MEMORY Virtoal memory uirtalizaton (s similar to the virtoal femory support provided Ay modirn oparating systems In a traditona! exewhor environment, the perating syste marntains mappings of virtual memory to machine memory using page fable, wpich & & one-stage mapeirg prom vyirtoal memory fo machine memory. Al modern vs6 cpus fpclode a memory manage ment onit (HMo) and a hranlation fookaside fuer CHB) fo optirat2ze virtua! memory Performan we However, in a vetel virtual exewhor envronment, virfea/ rnemory virtualization. involves sharing the physical system memory in RAM and dynamica “tty allocating if fo the physical memory a the VMs (6) This en a fwo- stage , mapping process should be maintatrad by the quest os and the van, recpectively. virtual memory to phywcal memory and physical memory fo machine memory. furlhermore, MMU virtvale ~zatton should fe supported , which ts hramp -arerd f tho guest os. The guest 0s contiwes fo conhol the mapping of virtual adelremwes to the phystal memory addresses og v's Bot the quest os cannot intty access the actual machine memory. The vit ps respons! ble for mapping fhe guest physyca/ CRO AB fhe atéval machine memory . (ft Py 0 ~ level peal mapping preedurer @ sine each pege fable op the guest aes Ka a seperate page fable in pha VN cory ésponcling to it: the VMH page febe ts alted te shaclow page fable. Wested page fables add another ayer op indirection fo urtval memory. The MHY already Kanclles virtual- f= Phy teal translations as dy ined ky fhe 95 + Then the phydeat memory addresses aye franslated fo machine adresse osihg another yet g page fables deg ined by the Aypervis or

You might also like