[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

x86 Virtualization requirements (was Re: [Xen-users] intel or amd?)



On Friday 29 February 2008 09:14:01 am Michael Harley wrote:
> You can get some info from
> http://en.wikipedia.org/wiki/X86_virtualization

This link leads near the top to a link discussing requirements for an 
architecture to be virtualizable, about how efficient virtualization requires 
all sensitive instructions to be a subset of all privileged instructions (and 
therefore trapable) and from the x86 section - 
http://en.wikipedia.org/wiki/Popek_and_Goldberg_virtualization_requirements#IA-32_.28x86.29

they say:

"IA-32 (x86)

(Main article:X86 virtualization)

The IA-32 instruction set contains 17 sensitive, unprivileged instructions[3]. 
They can be categorized in two groups:

    * Sensitive register instructions: read or change sensitive registers 
and/or memory locations such as a clock register or interrupt registers:
          o SGDT, SIDT, SLDT
          o SMSW
          o PUSHF, POPF
    * Protection system instructions: reference the storage protection system, 
memory or address relocation system:
          o LAR, LSL, VERR, VERW
          o POP
          o PUSH
          o CALL, JMP, INT n, RET
          o STR
          o MOV"

MOV ??? That will really slow things down. How does xen handle this in an hvm 
domain? Does it trap all MOV instructions (even in a REP block), or does it 
just trap on illegal addresses?

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.