[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] Xen inside Xen with VMX?



Hello,
 
thanks to everyone who replied! What I was thinking of was something along the lines of Daniel's suggestion below, i.e. if the VMX architecture makes it possible to setup enough proper traps etc. so that you can actually "cheaply" emulate all these VMX registers/features and thus have multiple, nested HVM's. I don't know if it's useful but it is at least interesting to think about how it would work and how big/small a performance cost you could get away with if you had, say, 10 nested HVM's with Linux or something running in the innermost ;) I guess the emulation cost will be bigger for the "non-primary" HVM's (the primary being the one running closest to the hardware). But I guess that even stuff like VT-d directed I/O could be recursively emulated and yet still have "true" direct I/O for the innermost operating system.
 
Cheers,
 
MH

> From: stodden@xxxxxxxxxx
> To: bguthro@xxxxxxxxxxxxxxx
> Date: Thu, 31 Jan 2008 14:33:46 +0100
> Subject: Re: [Xen-devel] Xen inside Xen with VMX?
> CC: xen-devel@xxxxxxxxxxxxxxxxxxx; paradigm__82@xxxxxxxxxxx
>
>
> On Thu, 2008-01-31 at 07:07 -0500, Ben Guthro wrote:
> > Current VT implementations do not have this ability, AFAIK.
>
> Indeed. There's only one root mode, and the processor has no concept of
> recursively stacking roots and accompanying protection levels on top of
> each other.
>
> Nonetheless, root mode could be emulated, i.e. via shadow VMCBs,
> optional shadow NPTs and emulation of the respective instruction subset.
>
> Would suffer from the same (most probably solvable) problems regarding
> privilege compression and the like, but probably an interesting
> excercise.
>
> Maybe one should put it on some (nonexisting) list for interesting
> [academic] projects.
>
> regards,
> daniel
>
> --
> Daniel Stodden
> LRR - Lehrstuhl für Rechnertechnik und Rechnerorganisation
> Institut für Informatik der TU München D-85748 Garching
> http://www.lrr.in.tum.de/~stodden mailto:stodden@xxxxxxxxxx
> PGP Fingerprint: F5A4 1575 4C56 E26A 0B33 3D80 457E 82AE B0D8 735B
>
>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel



Express yourself instantly with MSN Messenger! MSN Messenger
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.