Pre-virtualization internals
|
|
- Scarlett Shavonne Conley
- 6 years ago
- Views:
Transcription
1 Pre-virtualization internals Joshua LeVasseur 3 March 2006 L4Ka.org Universität Karlsruhe (TH)
2 Compile time overview Compiler C code Assembler code OS source code Hand-written assembler Afterburner Assembler Virtualization aware binary 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 2 of 30
3 Afterburner assembler parser Built using an Antlr grammar 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 3 of 30
4 Instruction padding Virtualization aware binary movl %eax, %fs Afterburner.L_sensitive_6: movl %eax, %fs nop nop nop nop nop nop.l_sensitive_7:.pushsection.afterburn.balign 4.long.L_sensitive_6.long.L_sensitive_7.popsection 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 4 of 30
5 Address space Xen x GB Guest application Guest kernel IPVMM Hypervisor 0 Ring 1 Ring Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 5 of 30
6 Address space Xen x86 L4, Linux-on-Linux (generic) 0 4 GB Guest application Guest kernel IPVMM Hypervisor 0 Ring 1 Ring 3 Guest kernel IPVMM Hypervisor Guest application Hypervisor 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 6 of 30
7 Loading the guest kernel Virtualization aware binary Guest kernel Guest kernel IPVMM IPVMM IPVMM Hypervisor 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 7 of 30
8 In-Place VMM mov eax, cr3 sti cli popf hlt frontend Virtual CPU IPVMM backend Map, unmap, TLB, timer, threads Page faults, traps, system calls, interrupts Hypervisor 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 8 of 30
9 Constraints Code expansion: Timing? Interrupts? Simple state machine? Efficiency? 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 9 of 30
10 Constraints Code expansion: Timing? Interrupts? Simple state machine? Efficiency? Guest kernel is a sequential process Important: forward progress Unimportant: rate of forward progress We provide a virtual CPU Illusion of continuous time 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 10 of 30
11 Constraints Code expansion: Timing? Interrupts? Simple state machine? Efficiency? Guest kernel is a sequential process Important: forward progress Unimportant: rate of forward progress We provide a virtual CPU Illusion of continuous time Delay delivery Synchronous (sti, popf) Optimize common case Asynchronous Avoid IPVMM reentrance 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 11 of 30
12 Constraints Code expansion: Timing? Interrupts? Simple state machine? Efficiency? Thread model VM thread Interrupt thread Guest kernel is a sequential process Important: forward progress Unimportant: rate of forward progress We provide a virtual CPU Illusion of continuous time Delay delivery Synchronous (sti, popf) Optimize common case Asynchronous Avoid IPVMM reentrance 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 12 of 30
13 Threads mov eax, cr3 sti cli popf hlt frontend backend VM thread Page faults, traps, system calls Hypervisor 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 13 of 30
14 Threads mov eax, cr3 sti cli popf hlt frontend IRQ thread backend VM thread Interrupts Page faults, traps, system calls Hypervisor 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 14 of 30
15 Frontend entry mov eax, cr3 mov eax, cr3 sti cli popf hlt Assembler trampoline frontend Establish C calling conventions. Future: eliminate by Afterburning the IPVMM. IRQ thread backend VM thread C++ frontend, thread Interrupts Page faults, traps, system calls Hypervisor 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 15 of 30
16 Boundary transitions Guest kernel invlpg vaddr pushl lea call popl %eax vaddr, %eax burn_invlpg %eax 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 16 of 30
17 Boundary transitions (generic) Guest kernel IPVMM trampoline invlpg vaddr pushl %eax lea vaddr, %eax call burn_invlpg popl %eax burn_invlpg: // Preserve C clobbers. pushl %eax pushl %ecx pushl %edx // Build burn_clobbers_frame_t parameter. pushl %esp subl $8, 0(%esp) call afterburn_cpu_invlpg_ext popl %edx ; popl %ecx ; popl %eax ret 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 17 of 30
18 Boundary transitions (generic) Guest kernel invlpg vaddr pushl %eax lea vaddr, %eax call burn_invlpg popl %eax IPVMM trampoline burn_invlpg: // Preserve C clobbers. pushl %eax pushl %ecx pushl %edx // Build burn_clobbers_frame_t parameter. pushl %esp subl $8, 0(%esp) call afterburn_cpu_invlpg_ext popl %edx ; popl %ecx ; popl %eax ret IPVMM C++ frontend struct burn_clobbers_frame_t { word_t burn_ret_address; word_t frame_pointer; word_t edx; word_t ecx; word_t eax; word_t guest_ret_address; word_t params[0]; }; extern "C" void afterburn_cpu_invlpg_ext( burn_clobbers_frame_t *frame ) { backend_flush_vaddr( frame->eax ); } 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 18 of 30
19 Atomic instructions mov eax, cr3 VM thread C++ code Time Interrupts During IPVMM code? During a hypercall? 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 19 of 30
20 Thread reschedule mov eax, cr3 VM thread C++ code ret Time VM thread C++ code: IRQ dispatch 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 20 of 30
21 Race conditions VM thread Time iret if( IRQ pending ) reschedule(); else iret(); 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 21 of 30
22 Race conditions Time iret VM thread iret_restart: if( IRQ pending ) reschedule(); else iret(); IRQ thread if( VM thread in iret ) rollback( iret_restart ); Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 22 of 30
23 Modules Guest kernel Interrupt delivery to guest Memory paging Instruction set emulation Port accesses Device memory accesses Device switch Network RTC Synchronous events Asynchronous events Disk PIT Serial port PCI Interrupt dispatch Hypervisor PIC 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 23 of 30
24 Adding a device model 1. Define a device class 2. Define its interfaces: Port accesses Memory-mapped registers 3. Define its PCI registers: Static structure created at compile-time 4. Raise interrupts with the intlogic_t class 5. In some cases, define a virtual IRQ handler 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 24 of 30
25 Productivity-focused coding Minimize errors: Simple code Avoid purely quantitative increase in work Use assertions Avoid reentrancy C++ Modularity (quickly understood code) Compile-time features only Fast (world's fastest kernel, L4Ka::Pistachio, is written in C++) No dynamic memory allocation Construct data structures at compile time Ex: big switch() statement for port access, PCI device access Heavily typed 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 25 of 30
26 Productivity-focused coding Code maintenance: Minimize C Preprocessor We want structured code Use CML2 configuration system Feature management Code reuse: Abstract frontends and backends Reuse frontend across multiple backends 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 26 of 30
27 Legacy devices Keyboard UART 1 3, 4 CPU INTR XT-PIC primary 2 INTR XT-PIC secondary 8 0 RTC Channel 0 PIT Channel 2 PC speaker 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 27 of 30
28 Legacy devices: IDT vector Keyboard UART 1 3, 4 CPU INTR XT-PIC primary 2 INTR XT-PIC secondary 8 0 RTC Channel 0 ICW2 PIT Channel 2 PC speaker XT-PIC IRQ + IDT vector 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 28 of 30
29 Legacy devices: Ports 3F8h, 2F8h, 3E8h, 2E8h 60h, 64h Keyboard UART 20h, 21h 1 3, 4 CPU INTR XT-PIC primary 2 INTR XT-PIC secondary 8 0 A0h, A1h 70h, 71h RTC 40h-43h Channel 0 ICW2 PIT Channel 2 PC speaker XT-PIC IRQ + IDT vector 61h 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 29 of 30
30 Further information Publications: Full paper: Pre-Virtualization: Slashing the Cost of Virtualization Quick read: Pre-Virtualization: Uniting Two Worlds Quick read: White paper 2006 Universität Karlsruhe Pre-virtualization internals Joshua LeVasseur Page 30 of 30
Homework / Exam. Return and Review Exam #1 Reading. Machine Projects. Labs. S&S Extracts , PIC Data Sheet. Start on mp3 (Due Class 19)
Homework / Exam Return and Review Exam #1 Reading S&S Extracts 385-393, PIC Data Sheet Machine Projects Start on mp3 (Due Class 19) Labs Continue in labs with your assigned section 1 Interrupts An interrupt
More informationW4118: interrupt and system call. Junfeng Yang
W4118: interrupt and system call Junfeng Yang Outline Motivation for protection Interrupt System call 2 Need for protection Kernel privileged, cannot trust user processes User processes may be malicious
More informationAdvanced Operating Systems (CS 202) Virtualization
Advanced Operating Systems (CS 202) Virtualization Virtualization One of the natural consequences of the extensibility research we discussed What is virtualization and what are the benefits? 2 Virtualization
More informationMicrokernel Construction
Microkernel Construction Kernel Entry / Exit Nils Asmussen 05/04/2017 1 / 45 Outline x86 Details Protection Facilities Interrupts and Exceptions Instructions for Entry/Exit Entering NOVA Leaving NOVA 2
More informationOverview of System Virtualization: The most powerful platform for program analysis and system security. Zhiqiang Lin
CS 6V81-05: System Security and Malicious Code Analysis Overview of System Virtualization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
More informationW4118: virtual machines
W4118: virtual machines Instructor: Junfeng Yang References: Modern Operating Systems (3 rd edition), Operating Systems Concepts (8 th edition), previous W4118, and OS at MIT, Stanford, and UWisc Virtual
More informationMicrokernel Construction
Kernel Entry / Exit SS2013 Control Transfer Microkernel User Stack A Address Space Kernel Stack A User Stack User Stack B Address Space Kernel Stack B User Stack 1. Kernel Entry (A) 2. Thread Switch (A
More informationThe K Project. Interrupt and Exception Handling. LSE Team. May 14, 2018 EPITA. The K Project. LSE Team. Introduction. Interrupt Descriptor Table
and Exception Handling EPITA May 14, 2018 (EPITA) May 14, 2018 1 / 37 and Exception Handling Exception : Synchronous with program execution (e.g. division by zero, accessing an invalid address) : Asynchronous
More informationIntel VMX technology
Intel VMX technology G. Lettieri 28 Oct. 2015 1 The Virtual Machine Monitor In the context of hardware-assisted virtualization, it is very common to introduce the concept of a Virtual Machine Monitor (VMM).
More informationMultiprocessor Solution
Mutual Exclusion Multiprocessor Solution P(sema S) begin while (TAS(S.flag)==1){}; { busy waiting } S.Count= S.Count-1 if (S.Count < 0){ insert_t(s.qwt) BLOCK(S) {inkl.s.flag=0)!!!} } else S.flag =0 end
More informationVirtualization. Pradipta De
Virtualization Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
More informationOperating Systems Engineering Recitation #3 (part 2): Interrupt and Exception Handling on the x86. (heavily) based on MIT 6.
236366 Operating Systems Engineering Recitation #3 (part 2): Interrupt and Exception Handling on the x86 (heavily) based on MIT 6.828 (2005, lec8) x86 Interrupt Nomenclature Hardware Interrupt (external)
More informationLinux and Xen. Andrea Sarro. andrea.sarro(at)quadrics.it. Linux Kernel Hacking Free Course IV Edition
Linux and Xen Andrea Sarro andrea.sarro(at)quadrics.it Linux Kernel Hacking Free Course IV Edition Andrea Sarro (andrea.sarro(at)quadrics.it) Linux and Xen 07/05/2008 1 / 37 Introduction Xen and Virtualization
More informationHomework. Reading. Machine Projects. Labs. Intel 8254 Programmable Interval Timer (PIT) Data Sheet. Continue on MP3
Homework Reading Intel 8254 Programmable Interval Timer (PIT) Data Sheet Machine Projects Continue on MP3 Labs Continue in labs with your assigned section 1 Restrictions on ISR Code Software that was executing
More informationIntroduction Construction State of the Art. Virtualization. Bernhard Kauer OS Group TU Dresden Dresden,
Virtualization Bernhard Kauer OS Group TU Dresden bk@vmmon.org Dresden, 2010-07-15 Motivation The vision: general-purpose OS secure trustworthy small fast fancy First problem: Legacy Application Supporting
More informationPart I. X86 architecture overview. Secure Operating System Design and Implementation x86 architecture. x86 processor modes. X86 architecture overview
X86 architecture overview Overview Secure Operating System Design and Implementation x86 architecture Jon A. Solworth Part I X86 architecture overview Dept. of Computer Science University of Illinois at
More informationICS143A: Principles of Operating Systems. Midterm recap, sample questions. Anton Burtsev February, 2017
ICS143A: Principles of Operating Systems Midterm recap, sample questions Anton Burtsev February, 2017 Describe the x86 address translation pipeline (draw figure), explain stages. Address translation What
More information+ Overview. Projects: Developing an OS Kernel for x86. ! Handling Intel Processor Exceptions: the Interrupt Descriptor Table (IDT)
+ Projects: Developing an OS Kernel for x86 Low-Level x86 Programming: Exceptions, Interrupts, and Timers + Overview! Handling Intel Processor Exceptions: the Interrupt Descriptor Table (IDT)! Handling
More informationProtection and System Calls. Otto J. Anshus
Protection and System Calls Otto J. Anshus Protection Issues CPU protection Prevent a user from using the CPU for too long Throughput of jobs, and response time to events (incl. user interactive response
More information3. Process Management in xv6
Lecture Notes for CS347: Operating Systems Mythili Vutukuru, Department of Computer Science and Engineering, IIT Bombay 3. Process Management in xv6 We begin understanding xv6 process management by looking
More information[537] Virtual Machines. Tyler Harter
[537] Virtual Machines Tyler Harter Outline Machine Virtualization Overview CPU Virtualization (Trap-and-Emulate) CPU Virtualization (Modern x86) Memory Virtualization Performance Challenges Outline Machine
More informationProcesses (Intro) Yannis Smaragdakis, U. Athens
Processes (Intro) Yannis Smaragdakis, U. Athens Process: CPU Virtualization Process = Program, instantiated has memory, code, current state What kind of memory do we have? registers + address space Let's
More informationXen and the Art of Virtualization. CSE-291 (Cloud Computing) Fall 2016
Xen and the Art of Virtualization CSE-291 (Cloud Computing) Fall 2016 Why Virtualization? Share resources among many uses Allow heterogeneity in environments Allow differences in host and guest Provide
More informationCMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 09, SPRING 2013
CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 09, SPRING 2013 TOPICS TODAY I/O Architectures Interrupts Exceptions FETCH EXECUTE CYCLE 1.7 The von Neumann Model This is a general
More informationWindows Interrupts
Windows 2000 - Interrupts Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik 1 Interrupts Software and Hardware Interrupts and Exceptions Kernel installs interrupt trap handlers Interrupt
More informationVirtual Machines. Part 2: starting 19 years ago. Operating Systems In Depth IX 1 Copyright 2018 Thomas W. Doeppner. All rights reserved.
Virtual Machines Part 2: starting 19 years ago Operating Systems In Depth IX 1 Copyright 2018 Thomas W. Doeppner. All rights reserved. Operating Systems In Depth IX 2 Copyright 2018 Thomas W. Doeppner.
More informationW4118: PC Hardware and x86. Junfeng Yang
W4118: PC Hardware and x86 Junfeng Yang A PC How to make it do something useful? 2 Outline PC organization x86 instruction set gcc calling conventions PC emulation 3 PC board 4 PC organization One or more
More informationCross-architecture Virtualisation
Cross-architecture Virtualisation Tom Spink Harry Wagstaff, Björn Franke School of Informatics University of Edinburgh Virtualisation Many of you will be familiar with same-architecture virtualisation
More informationVirtual Virtual Memory
Virtual Virtual Memory Jason Power 3/20/2015 With contributions from Jayneel Gandhi and Lena Olson 4/17/2015 UNIVERSITY OF WISCONSIN 1 Virtual Machine History 1970 s: VMMs 1997: Disco 1999: VMWare (binary
More informationVirtualization with XEN. Trusted Computing CS599 Spring 2007 Arun Viswanathan University of Southern California
Virtualization with XEN Trusted Computing CS599 Spring 2007 Arun Viswanathan University of Southern California A g e n d a Introduction Virtualization approaches Basic XEN Architecture Setting up XEN Bootstrapping
More informationCS 550 Operating Systems Spring Interrupt
CS 550 Operating Systems Spring 2019 Interrupt 1 Revisit -- Process MAX Stack Function Call Arguments, Return Address, Return Values Kernel data segment Kernel text segment Stack fork() exec() Heap Data
More information4) C = 96 * B 5) 1 and 3 only 6) 2 and 4 only
Instructions: The following questions use the AT&T (GNU) syntax for x86-32 assembly code, as in the course notes. Submit your answers to these questions to the Curator as OQ05 by the posted due date and
More informationBackground. IBM sold expensive mainframes to large organizations. Monitor sits between one or more OSes and HW
Virtual Machines Background IBM sold expensive mainframes to large organizations Some wanted to run different OSes at the same time (because applications were developed on old OSes) Solution: IBM developed
More informationBuffer Overflow Attack
Buffer Overflow Attack What every applicant for the hacker should know about the foundation of buffer overflow attacks By (Dalgona@wowhacker.org) Email: zinwon@gmail.com 2005 9 5 Abstract Buffer overflow.
More informationCPEG421/621 Tutorial
CPEG421/621 Tutorial Compiler data representation system call interface calling convention Assembler object file format object code model Linker program initialization exception handling relocation model
More informationCS-580K/480K Advanced Topics in Cloud Computing. VM Virtualization II
CS-580K/480K Advanced Topics in Cloud Computing VM Virtualization II 1 How to Build a Virtual Machine? 2 How to Run a Program Compiling Source Program Loading Instruction Instruction Instruction Instruction
More informationVirtualization. Adam Belay
Virtualization Adam Belay What is a virtual machine Simulation of a computer Running as an application on a host computer Accurate Isolated Fast Why use a virtual machine? To run multiple
More informationx86 architecture et similia
x86 architecture et similia 1 FREELY INSPIRED FROM CLASS 6.828, MIT A full PC has: PC architecture 2 an x86 CPU with registers, execution unit, and memory management CPU chip pins include address and data
More informationCS 5460/6460 Operating Systems
CS 5460/6460 Operating Systems Fall 2009 Instructor: Matthew Flatt Lecturer: Kevin Tew TAs: Bigyan Mukherjee, Amrish Kapoor 1 Join the Mailing List! Reminders Make sure you can log into the CADE machines
More informationVirtual Machine Virtual Machine Types System Virtual Machine: virtualize a machine Container: virtualize an OS Program Virtual Machine: virtualize a process Language Virtual Machine: virtualize a language
More informationCS 410/510. Mark P Jones Portland State University. Week 4: Memory Management
CS 410/510 Languages & Low-Level Programming Mark P Jones Portland State University Fall 2018 Week 4: Memory Management 1 Copyright Notice These slides are distributed under the Creative Commons Attribution
More informationOS Structure. Hardware protection & privilege levels Control transfer to and from the operating system
OS Structure Topics Hardware protection & privilege levels Control transfer to and from the operating system Learning Objectives: Explain what hardware protection boundaries are. Explain how applications
More informationOperating Systems CMPSCI 377 Spring Mark Corner University of Massachusetts Amherst
Operating Systems CMPSCI 377 Spring 2017 Mark Corner University of Massachusetts Amherst Last Class: Intro to OS An operating system is the interface between the user and the architecture. User-level Applications
More informationAdvanced Memory Management
Advanced Memory Management Main Points Applications of memory management What can we do with ability to trap on memory references to individual pages? File systems and persistent storage Goals Abstractions
More informationCIS Operating Systems CPU Mode. Professor Qiang Zeng Spring 2018
CIS 3207 - Operating Systems CPU Mode Professor Qiang Zeng Spring 2018 CPU Modes Two common modes Kernel mode The CPU has to be in this mode to execute the kernel code User mode The CPU has to be in this
More informationEmulation 2. G. Lettieri. 15 Oct. 2014
Emulation 2 G. Lettieri 15 Oct. 2014 1 I/O examples In an emulator, we implement each I/O device as an object, or a set of objects. The real device in the target system is connected to the CPU via an interface
More informationWhat You Need to Know for Project Three. Dave Eckhardt Steve Muckle
What You Need to Know for Project Three Dave Eckhardt Steve Muckle Overview Introduction to the Kernel Project Mundane Details in x86 registers, paging, the life of a memory access, context switching,
More informationx86 segmentation, page tables, and interrupts 3/17/08 Frans Kaashoek MIT
x86 segmentation, page tables, and interrupts 3/17/08 Frans Kaashoek MIT kaashoek@mit.edu Outline Enforcing modularity with virtualization Virtualize processor and memory x86 mechanism for virtualization
More informationSpring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand
Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,
More informationCS 5600 Computer Systems. Lecture 11: Virtual Machine Monitors
CS 5600 Computer Systems Lecture 11: Virtual Machine Monitors History In the 70s, there were dozens of OSes Unlike today, where Windows and Android dominate This created many problems Upgrading hardware
More informationAssembly Language. Lecture 2 - x86 Processor Architecture. Ahmed Sallam
Assembly Language Lecture 2 - x86 Processor Architecture Ahmed Sallam Introduction to the course Outcomes of Lecture 1 Always check the course website Don t forget the deadline rule!! Motivations for studying
More informationCS 537 Lecture 2 Computer Architecture and Operating Systems. OS Tasks
CS 537 Lecture 2 Computer Architecture and Operating Systems Michael Swift OS Tasks What is the role of the OS regarding hardware? What does the OS need from hardware to perform this role? 1 Computer Hardware
More informationAMD-K5. Software Development Guide PROCESSOR
AMD-K5 TM PROCESSOR Software Development Guide Publication # 20007 Rev: D Amendment/0 Issue Date: September 1996 This document contains information on a product under development at Advanced Micro Devices
More informationLecture 7. Xen and the Art of Virtualization. Paul Braham, Boris Dragovic, Keir Fraser et al. 16 November, Advanced Operating Systems
Lecture 7 Xen and the Art of Virtualization Paul Braham, Boris Dragovic, Keir Fraser et al. Advanced Operating Systems 16 November, 2011 SOA/OS Lecture 7, Xen 1/38 Contents Virtualization Xen Memory CPU
More informationVirtualization. Operating Systems, 2016, Meni Adler, Danny Hendler & Amnon Meisels
Virtualization Operating Systems, 2016, Meni Adler, Danny Hendler & Amnon Meisels 1 What is virtualization? Creating a virtual version of something o Hardware, operating system, application, network, memory,
More informationTutorial 10 Protection Cont.
Tutorial 0 Protection Cont. 2 Privilege Levels Lower number => higher privilege Code can access data of equal/lower privilege levels only Code can call more privileged data via call gates Each level has
More informationSection 4: Threads and Context Switching
CS162 September 19-20, 2017 Contents 1 Warmup 2 1.1 Hello World............................................ 2 2 Vocabulary 2 3 Problems 3 3.1 Join................................................ 3 3.2
More informationCS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives
CS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives Virtual Machines Resource Virtualization Separating the abstract view of computing resources from the implementation of these resources
More informationThe Challenges of X86 Hardware Virtualization. GCC- Virtualization: Rajeev Wankar 36
The Challenges of X86 Hardware Virtualization GCC- Virtualization: Rajeev Wankar 36 The Challenges of X86 Hardware Virtualization X86 operating systems are designed to run directly on the bare-metal hardware,
More informationMechanisms for entering the system
Mechanisms for entering the system Yolanda Becerra Fontal Juan José Costa Prats Facultat d'informàtica de Barcelona (FIB) Universitat Politècnica de Catalunya (UPC) BarcelonaTech 2017-2018 QP Content Introduction
More information6.828: Using Virtual Memory. Adam Belay
6.828: Using Virtual Memory Adam Belay abelay@mit.edu 1 Outline Cool things you can do with virtual memory: Lazy page allocation (homework) Better performance/efficiency E.g. One zero-filled page E.g.
More informationMechanisms and constructs for System Virtualization
Mechanisms and constructs for System Virtualization Content Outline Design goals for virtualization General Constructs for virtualization Virtualization for: System VMs Process VMs Prevalent trends: Pros
More informationSection 4: Threads CS162. September 15, Warmup Hello World Vocabulary 2
CS162 September 15, 2016 Contents 1 Warmup 2 1.1 Hello World............................................ 2 2 Vocabulary 2 3 Problems 3 3.1 Join................................................ 3 3.2 Stack
More informationAssembly Language. Lecture 2 x86 Processor Architecture
Assembly Language Lecture 2 x86 Processor Architecture Ahmed Sallam Slides based on original lecture slides by Dr. Mahmoud Elgayyar Introduction to the course Outcomes of Lecture 1 Always check the course
More informationVirtualization, Xen and Denali
Virtualization, Xen and Denali Susmit Shannigrahi November 9, 2011 Susmit Shannigrahi () Virtualization, Xen and Denali November 9, 2011 1 / 70 Introduction Virtualization is the technology to allow two
More informationVirtual machine architecture and KVM analysis D 陳彥霖 B 郭宗倫
Virtual machine architecture and KVM analysis D97942011 陳彥霖 B96902030 郭宗倫 Virtual machine monitor serves as an interface between hardware and software; no matter what kind of hardware under, software can
More informationCOS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Prof. Margaret Martonosi Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall11/cos318/ Announcements Project
More informationChapter 5 B. Large and Fast: Exploiting Memory Hierarchy
Chapter 5 B Large and Fast: Exploiting Memory Hierarchy Dependability 5.5 Dependable Memory Hierarchy Chapter 6 Storage and Other I/O Topics 2 Dependability Service accomplishment Service delivered as
More informationby Marina Cholakyan, Hyduke Noshadi, Sepehr Sahba and Young Cha
CS 111 Scribe Notes for 4/11/05 by Marina Cholakyan, Hyduke Noshadi, Sepehr Sahba and Young Cha Processes What is a process? A process is a running instance of a program. The Web browser you're using to
More informationRootkits n Stuff
Rootkits n Stuff www.sigmil.org What a rootkit is(n t) IS Software intended to conceal running processes, files, etc from the OS A way to maintain control of a system after compromising it. ISN T A buffer
More informationCS 550 Operating Systems Spring System Call
CS 550 Operating Systems Spring 2018 System Call 1 Recap: The need for protection When running user processes, the OS needs to protect itself and other system components For reliability: buggy programs
More informationcsci 297: Advanced Operating Systems
csci 297: Advanced Operating Systems Professor Gabriel Parmer (aka. Gabe) gparmer@gwu.edu, office hours 10am 12 Tuesday (Tentative. Does this work for you?) Class: Tompkins 205, Monday 6:10 8:40 Acknowledgements:
More informationLast class: Today: Course administration OS definition, some history. Background on Computer Architecture
1 Last class: Course administration OS definition, some history Today: Background on Computer Architecture 2 Canonical System Hardware CPU: Processor to perform computations Memory: Programs and data I/O
More informationAdvanced Computer Architecture
ECE 563 Advanced Computer Architecture Fall 2007 Lecture 14: Virtual Machines 563 L14.1 Fall 2009 Outline Types of Virtual Machine User-level (or Process VMs) System-level Techniques for implementing all
More informationWhat is concurrency? Concurrency. What is parallelism? concurrency vs parallelism. Concurrency: (the illusion of) happening at the same time.
What is concurrency? Concurrency Johan Montelius KTH 2017 Concurrency: (the illusion of) happening at the same time. A property of the programing model. Why would we want to do things concurrently? What
More informationIntel Virtualization Technology Roadmap and VT-d Support in Xen
Intel Virtualization Technology Roadmap and VT-d Support in Xen Jun Nakajima Intel Open Source Technology Center Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.
More informationOperating Systems: Virtual Machines & Exceptions
Operating Systems: Machines & Exceptions Daniel Sanchez Computer Science & Artificial Intelligence Lab M.I.T. L19-1 6.004 So Far: Single-User Machines Program Hardware ISA (e.g., RISC-V) Processor Memory
More informationOperating Systems ECE344
Operating Systems ECE344 Ding Yuan Announcements & reminders Lab schedule is out Form your group of 2 by this Friday (18 th ), 5PM Grading policy: Final exam: 50% Midterm exam: 25% Lab assignment: 25%
More informationInterrupt handling and context switching
Interrupt handling and context switching slide 1 these two topics are separate and we will examine them in turn Interrupts slide 2 applications Shell daemons utilities Device drivers HW Kernel compiler
More informationXen and the Art of Virtualization. Nikola Gvozdiev Georgian Mihaila
Xen and the Art of Virtualization Nikola Gvozdiev Georgian Mihaila Outline Xen and the Art of Virtualization Ian Pratt et al. I. The Art of Virtualization II. Xen, goals and design III. Xen evaluation
More informationVIRTUALIZATION. Dresden, 2011/6/23. Julian Stecklina
Department of Computer Science Institute of Systems Architecture, Operating Systems Group VIRTUALIZATION Julian Stecklina (jsteckli@os.inf.tu-dresden.de) Dresden, 2011/6/23 00 Goals Give you an overview
More informationUMBC. contain new IP while 4th and 5th bytes contain CS. CALL BX and CALL [BX] versions also exist. contain displacement added to IP.
Procedures: CALL: Pushes the address of the instruction following the CALL instruction onto the stack. RET: Pops the address. SUM PROC NEAR USES BX CX DX ADD AX, BX ADD AX, CX MOV AX, DX RET SUM ENDP NEAR
More informationPractical Malware Analysis
Practical Malware Analysis Ch 4: A Crash Course in x86 Disassembly Revised 1-16-7 Basic Techniques Basic static analysis Looks at malware from the outside Basic dynamic analysis Only shows you how the
More informationCS5460: Operating Systems
CS5460: Operating Systems Lecture 2: OS Hardware Interface (Chapter 2) Course web page: http://www.eng.utah.edu/~cs5460/ CADE lab: WEB L224 and L226 http://www.cade.utah.edu/ Projects will be on Linux
More informationConcurrency. Johan Montelius KTH
Concurrency Johan Montelius KTH 2017 1 / 32 What is concurrency? 2 / 32 What is concurrency? Concurrency: (the illusion of) happening at the same time. 2 / 32 What is concurrency? Concurrency: (the illusion
More informationChanges made in this version not seen in first lecture:
Changelog 0 Changes made in this version not seen in first lecture: 30 August: juggling stacks: add arguments to stacks 30 August: where things go in context switch: new slide this duplicates some notional
More informationIntroduction to Virtual Machines. Carl Waldspurger (SB SM 89 PhD 95) VMware R&D
Introduction to Virtual Machines Carl Waldspurger (SB SM 89 PhD 95) VMware R&D Overview Virtualization and VMs Processor Virtualization Memory Virtualization I/O Virtualization Typesof Virtualization Process
More informationBASIC INTERRUPT PROCESSING
Interrupts BASIC INTERRUPT PROCESSING This section discusses the function of an interrupt in a microprocessor-based system. Structure and features of interrupts available to Intel microprocessors. The
More informationCOS 318: Operating Systems. Overview. Prof. Margaret Martonosi Computer Science Department Princeton University
COS 318: Operating Systems Overview Prof. Margaret Martonosi Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall11/cos318/ Announcements Precepts: Tue (Tonight)!
More informationAssembly Language: Function Calls
Assembly Language: Function Calls 1 Goals of this Lecture Help you learn: Function call problems: Calling and returning Passing parameters Storing local variables Handling registers without interference
More informationSystem Programming. Prof. Dr. Antônio Augusto Fröhlich. Nov 2006
SysProg Antônio Augusto Fröhlich (http://www.lisha.ufsc.br) 88 System Programming Prof. Dr. Antônio Augusto Fröhlich guto@lisha.ufsc.br http://www.lisha.ufsc.br/~guto Nov 2006 SysProg Antônio Augusto Fröhlich
More informationIncrease KVM Performance/Density
Increase KVM Performance/Density with Hyper-V Memory Enlightenments Interface Chao Peng (chao.p.peng@intel.com) Contributors: Chao Gao, Yi Sun Expectations in Memory Virtualization Space Time High Performance
More informationVirtual Machines. To do. q VM over time q Implementation methods q Hardware features supporting VM q Next time: Midterm?
Virtual Machines To do q VM over time q Implementation methods q Hardware features supporting VM q Next time: Midterm? *Partially based on notes from C. Waldspurger, VMware, 2010 and Arpaci-Dusseau s Three
More informationIntroduction to the Process David E. Culler CS162 Operating Systems and Systems Programming Lecture 2 Sept 3, 2014
Introduction to the Process David E. Culler CS162 Operating Systems and Systems Programming Lecture 2 Sept 3, 2014 Reading: A&D CH2.1-7 HW: 0 out, due 9/8 Recall: What is an operating system? Special layer
More informationAssembly Language: Function Calls" Goals of this Lecture"
Assembly Language: Function Calls" 1 Goals of this Lecture" Help you learn:" Function call problems:" Calling and returning" Passing parameters" Storing local variables" Handling registers without interference"
More informationFunction Calls COS 217. Reading: Chapter 4 of Programming From the Ground Up (available online from the course Web site)
Function Calls COS 217 Reading: Chapter 4 of Programming From the Ground Up (available online from the course Web site) 1 Goals of Today s Lecture Finishing introduction to assembly language o EFLAGS register
More informationVIRTUALIZATION: IBM VM/370 AND XEN
1 VIRTUALIZATION: IBM VM/370 AND XEN CS6410 Hakim Weatherspoon IBM VM/370 Robert Jay Creasy (1939-2005) Project leader of the first full virtualization hypervisor: IBM CP-40, a core component in the VM
More informationDan Noé University of New Hampshire / VeloBit
Dan Noé University of New Hampshire / VeloBit A review of how the CPU works The operating system kernel and when it runs User and kernel mode Device drivers Virtualization of memory Virtual memory Paging
More informationTCBs and Address-Space Layouts Universität Karlsruhe, System Architecture Group
µ-kernel Construction (3) TCBs and Address-Space Layouts 1 Thread Control Blocks (TCBs) 2 Fundamental Abstractions Thread Address space What is a thread? How to implement it? 3 Construction Conclusion
More informationImplementing Threads. Operating Systems In Depth II 1 Copyright 2018 Thomas W. Doeppner. All rights reserved.
Implementing Threads Operating Systems In Depth II 1 Copyright 2018 Thomas W Doeppner All rights reserved The Unix Address Space stack dynamic bss data text Operating Systems In Depth II 2 Copyright 2018
More information