|   | 
      | 
  
  
      | 
      | 
  
 
     | 
    | 
  
  
     | 
    | 
  
  
    |   | 
      | 
  
  
    | 
         
xen-users
x86 Virtualization requirements (was Re: [Xen-users] intel or amd?)
 
On Friday 29 February 2008 09:14:01 am Michael Harley wrote:
> You can get some info from
> http://en.wikipedia.org/wiki/X86_virtualization
This link leads near the top to a link discussing requirements for an 
architecture to be virtualizable, about how efficient virtualization requires 
all sensitive instructions to be a subset of all privileged instructions (and 
therefore trapable) and from the x86 section - 
http://en.wikipedia.org/wiki/Popek_and_Goldberg_virtualization_requirements#IA-32_.28x86.29
they say:
"IA-32 (x86)
(Main article:X86 virtualization)
The IA-32 instruction set contains 17 sensitive, unprivileged instructions[3]. 
They can be categorized in two groups:
    * Sensitive register instructions: read or change sensitive registers 
and/or memory locations such as a clock register or interrupt registers:
          o SGDT, SIDT, SLDT
          o SMSW
          o PUSHF, POPF
    * Protection system instructions: reference the storage protection system, 
memory or address relocation system:
          o LAR, LSL, VERR, VERW
          o POP
          o PUSH
          o CALL, JMP, INT n, RET
          o STR
          o MOV"
MOV ??? That will really slow things down. How does xen handle this in an hvm 
domain? Does it trap all MOV instructions (even in a REP block), or does it 
just trap on illegal addresses?
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
 |   
 
 | 
    | 
  
  
    |   | 
    |