From: Zachary Amsden <zamsden@redhat.com>
To: Avi Kivity <avi@redhat.com>
Cc: Joerg Roedel <joro@8bytes.org>,
Joerg Roedel <joerg.roedel@amd.com>, kvm <kvm@vger.kernel.org>
Subject: Re: Nested SVM and migration
Date: Mon, 22 Feb 2010 07:24:02 -1000 [thread overview]
Message-ID: <4B82BDB2.4050806@redhat.com> (raw)
In-Reply-To: <4B82BAA4.2010709@redhat.com>
On 02/22/2010 07:11 AM, Avi Kivity wrote:
> On 02/22/2010 07:07 PM, Zachary Amsden wrote:
>> On 02/22/2010 07:02 AM, Avi Kivity wrote:
>>> On 02/22/2010 07:00 PM, Zachary Amsden wrote:
>>>>> The force vmexit would generate an INTR #vmexit even if the INTR
>>>>> intercept was disabled and even if no INTR is pending. However
>>>>> this was shot down since there was no equivalent vmx exit reason
>>>>> that we can except the guest to reasonably handle.
>>>>
>>>>
>>>> While true, my point is more precisely - how can this possibly work
>>>> for guests which MUST never exit SVM? As in, the hypervisor is
>>>> broken or deliberately disabled from taking exits, and in fact, may
>>>> no longer even exist in memory?
>>>
>>> These guests will be broken. My assumption was that only malicious
>>> guests will disable INTR intercepts (though I can imagine a
>>> Luvalley-like system that disables INTR intercepts when running dom0).
>>
>> Not an SVM expert, but can't you pass through INTR in SVM and leave a
>> fully functioning guest which technically runs under SVM but requires
>> no hypervisor?
>
> You could, but without trapping INTR, you can't reliably multiplex
> guests or have a hypervisor-controlled network interface. That means
> you're likely a blue pill thing.
Not necessarily; you could be a very subversive BIOS. You only
intercept #UD instruction and emulate SSE3 instructions in software.
Your control structure you mark unavailable as reserved BIOS memory and
you pass on interrupts and all exceptions to the booted OS.
You then implement nested VMRUN so as not to lock the OS out of the
hardware SVM acceleration..
Quite reasonable actually, and not a blue pill. Not 100% secure and it
doesn't need to be, but it is 100% correct for a guest which obeys the
standard reasonable rules of not messing with BIOS reserved memory.
>
>> Is that what the Luvalley system does?
>
> Luvalley is vmx only at the moment, but it certainly could let its
> dom0 handle interrupts (since the scheduler and all device drivers are
> in dom0). Once it switches to a different guest, it needs to enable
> INTR.
I checked it out, interesting stuff.
Zach
next prev parent reply other threads:[~2010-02-22 17:24 UTC|newest]
Thread overview: 28+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-02-20 19:14 Nested SVM and migration Zachary Amsden
2010-02-20 20:18 ` Joerg Roedel
2010-02-20 23:26 ` Zachary Amsden
2010-02-21 12:10 ` Joerg Roedel
2010-02-21 12:24 ` Avi Kivity
2010-02-21 12:41 ` Joerg Roedel
2010-02-21 12:54 ` Avi Kivity
2010-02-21 13:09 ` Joerg Roedel
2010-02-21 13:14 ` Avi Kivity
[not found] ` <4B8137E7.4030001@redhat.com>
[not found] ` <20100221144352.GC26465@8bytes.org>
2010-02-22 16:54 ` Zachary Amsden
[not found] ` <4B814C41.7010105@redhat.com>
[not found] ` <20100221155624.GD26465@8bytes.org>
2010-02-22 16:56 ` Zachary Amsden
2010-02-22 16:59 ` Avi Kivity
2010-02-22 16:46 ` Zachary Amsden
2010-02-22 17:07 ` Joerg Roedel
2010-02-24 15:23 ` Joerg Roedel
2010-02-24 20:21 ` Zachary Amsden
2010-02-22 16:42 ` Zachary Amsden
2010-02-22 16:44 ` Avi Kivity
2010-02-22 17:00 ` Zachary Amsden
2010-02-22 17:02 ` Avi Kivity
2010-02-22 17:07 ` Zachary Amsden
2010-02-22 17:11 ` Avi Kivity
2010-02-22 17:24 ` Zachary Amsden [this message]
2010-02-22 16:39 ` Zachary Amsden
2010-02-21 7:23 ` Avi Kivity
2010-02-21 7:46 ` Gleb Natapov
2010-02-21 8:12 ` Avi Kivity
2010-02-21 12:18 ` Joerg Roedel
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4B82BDB2.4050806@redhat.com \
--to=zamsden@redhat.com \
--cc=avi@redhat.com \
--cc=joerg.roedel@amd.com \
--cc=joro@8bytes.org \
--cc=kvm@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox