WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

x86 Virtualization requirements (was Re: [Xen-users] intel or amd?)

To: xen-users@xxxxxxxxxxxxxxxxxxx
Subject: x86 Virtualization requirements (was Re: [Xen-users] intel or amd?)
From: jim burns <jim_burn@xxxxxxxxxxxxx>
Date: Sat, 1 Mar 2008 23:31:08 -0500
Delivery-date: Sat, 01 Mar 2008 20:31:45 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <47C93C4D.7070303@xxxxxxxxx>
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
References: <b9f669850802290026o4e66a4e7rfc000fe6f03cb3c3@xxxxxxxxxxxxxx> <47C93C4D.7070303@xxxxxxxxx> (sfid-20080301_062217_947338_23611226)
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: KMail/1.9.9
On Friday 29 February 2008 09:14:01 am Michael Harley wrote:
> You can get some info from
> http://en.wikipedia.org/wiki/X86_virtualization

This link leads near the top to a link discussing requirements for an 
architecture to be virtualizable, about how efficient virtualization requires 
all sensitive instructions to be a subset of all privileged instructions (and 
therefore trapable) and from the x86 section - 
http://en.wikipedia.org/wiki/Popek_and_Goldberg_virtualization_requirements#IA-32_.28x86.29

they say:

"IA-32 (x86)

(Main article:X86 virtualization)

The IA-32 instruction set contains 17 sensitive, unprivileged instructions[3]. 
They can be categorized in two groups:

    * Sensitive register instructions: read or change sensitive registers 
and/or memory locations such as a clock register or interrupt registers:
          o SGDT, SIDT, SLDT
          o SMSW
          o PUSHF, POPF
    * Protection system instructions: reference the storage protection system, 
memory or address relocation system:
          o LAR, LSL, VERR, VERW
          o POP
          o PUSH
          o CALL, JMP, INT n, RET
          o STR
          o MOV"

MOV ??? That will really slow things down. How does xen handle this in an hvm 
domain? Does it trap all MOV instructions (even in a REP block), or does it 
just trap on illegal addresses?

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

<Prev in Thread] Current Thread [Next in Thread>