SlideShare a Scribd company logo
1 of 28
Virtualization Technology For AMD Architecture Steve McDowell Division Marketing Manager Computation Products Group AMD steven.mcdowell @ amd.com Geoffrey Strongin Platform Security Architect Computation Products Group AMD geoffrey.strongin @ amd.com
Session Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Session Goals ,[object Object],[object Object],[object Object],[object Object]
Virtualization Virtualization is the pooling and abstraction of resources in a way that masks the physical nature and boundaries  of those resources from  the resource users
Problems With “Physical Boundaries”  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtualization In Servers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtualization In Clients ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual Machine Approaches ,[object Object],[object Object],[object Object],[object Object],[object Object],Carve a Server into Many Virtual Machines Hypervisor-based Virtualization Hosted Virtualization Mgmt Partition Guest OS Guest OS AMD64 w/“Pacifica” Hypervisor App App X86 Hardware Guest OS App Guest OS App Host Operating System Virtualization Software
System Architecture Makes A Difference ,[object Object],[object Object],Examples:  Today’s Server Architectures
Efficiencies Needed On x86  For Virtualization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Core “Pacifica” Architecture
Core “Pacifica” Architecture Virtual Machine Run (VMRUN) instruction ,[object Object],[object Object],[object Object],[object Object],[object Object],Host instruction Stream Guest instruction Stream VMRUN [rAX] VMCB Data Structure
Core “Pacifica” Architecture Intercepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Core “Pacifica” Architecture  Virtual Machine Control Block ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Core “Pacifica” Architecture  Address translation:  Page Tables Page Tables or  Directories If this is a “Guest Physical” it must  be translated to “Host Physical” via  the host page tables when nested  paging is enabled Input Linear/Virtual  Address (LA,VA) Final Host or Guest Physical Address CR3 (Physical Address) Guest or Host  Physical Address   of next table
Core “Pacifica” Architecture  Address translation:  Modes with virtualization
Core “Pacifica” Architecture Shadow Page Tables ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Core “Pacifica” Architecture  CPU Access protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Core “Pacifica” Architecture  Interrupts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Core “Pacifica” Architecture  System Management mode ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Core “Pacifica” Architecture  Containerized SMM flow Top: … VMMRUN [rAX] … (Examine Exit  Code) … If external SMM (Setup SMM save state) VMRUN [rAX] … Loop Top Host Inst 1 Inst 2 SMI Guest RSM SMM Entry Point SMM Code SMM Save  State SMI Intercept RSM Intercept
Core “Pacifica” Architecture  Paged Real mode (New) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Core “Pacifica” Architecture  DMA protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Call To Action ,[object Object],[object Object],[object Object],[object Object]
Additional Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Community Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 

More Related Content

What's hot

Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsKingfin Enterprises Limited
 
Hardware VDI vs. Software VDI
Hardware VDI vs. Software VDIHardware VDI vs. Software VDI
Hardware VDI vs. Software VDIcitrixgurl
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2vivekbhat
 
Security in a Virtualised Environment
Security in a Virtualised EnvironmentSecurity in a Virtualised Environment
Security in a Virtualised EnvironmentPeter Wood
 
System Center Virtual Machine Manager 2012 - Whats New
System Center  Virtual Machine Manager 2012 - Whats NewSystem Center  Virtual Machine Manager 2012 - Whats New
System Center Virtual Machine Manager 2012 - Whats NewAmit Gatenyo
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMwareDevansh Chowdhary
 
Vmware Certified Professional 6 2V0-621 Dumps
Vmware Certified Professional 6 2V0-621 DumpsVmware Certified Professional 6 2V0-621 Dumps
Vmware Certified Professional 6 2V0-621 DumpsShamar41
 
Vsicm51 m01 course_intro_
Vsicm51 m01 course_intro_Vsicm51 m01 course_intro_
Vsicm51 m01 course_intro_Luan Truong Duc
 
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...Edureka!
 
XS Japan 2008 Project Status English
XS Japan 2008 Project Status EnglishXS Japan 2008 Project Status English
XS Japan 2008 Project Status EnglishThe Linux Foundation
 
VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101 VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101 VMworld
 
vCenter Operations 5: Level 300 training
vCenter Operations 5: Level 300 trainingvCenter Operations 5: Level 300 training
vCenter Operations 5: Level 300 trainingEric Sloof
 
Availability Considerations for SQL Server
Availability Considerations for SQL ServerAvailability Considerations for SQL Server
Availability Considerations for SQL ServerBob Roudebush
 
White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...
White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...
White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...EMC
 
Improving Application Availability on Virtual Machines
Improving Application Availability on Virtual MachinesImproving Application Availability on Virtual Machines
Improving Application Availability on Virtual MachinesNeverfail Group
 

What's hot (20)

Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environments
 
Hardware VDI vs. Software VDI
Hardware VDI vs. Software VDIHardware VDI vs. Software VDI
Hardware VDI vs. Software VDI
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Security in a Virtualised Environment
Security in a Virtualised EnvironmentSecurity in a Virtualised Environment
Security in a Virtualised Environment
 
System Center Virtual Machine Manager 2012 - Whats New
System Center  Virtual Machine Manager 2012 - Whats NewSystem Center  Virtual Machine Manager 2012 - Whats New
System Center Virtual Machine Manager 2012 - Whats New
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMware
 
Vmware Certified Professional 6 2V0-621 Dumps
Vmware Certified Professional 6 2V0-621 DumpsVmware Certified Professional 6 2V0-621 Dumps
Vmware Certified Professional 6 2V0-621 Dumps
 
XS Boston 2008 OVF
XS Boston 2008 OVFXS Boston 2008 OVF
XS Boston 2008 OVF
 
XS Boston 2008 Malware & Training
XS Boston 2008 Malware & TrainingXS Boston 2008 Malware & Training
XS Boston 2008 Malware & Training
 
Vsicm51 m01 course_intro_
Vsicm51 m01 course_intro_Vsicm51 m01 course_intro_
Vsicm51 m01 course_intro_
 
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
 
XS Japan 2008 Project Status English
XS Japan 2008 Project Status EnglishXS Japan 2008 Project Status English
XS Japan 2008 Project Status English
 
VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101 VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101
 
vCenter Operations 5: Level 300 training
vCenter Operations 5: Level 300 trainingvCenter Operations 5: Level 300 training
vCenter Operations 5: Level 300 training
 
Availability Considerations for SQL Server
Availability Considerations for SQL ServerAvailability Considerations for SQL Server
Availability Considerations for SQL Server
 
White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...
White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...
White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...
 
Improving Application Availability on Virtual Machines
Improving Application Availability on Virtual MachinesImproving Application Availability on Virtual Machines
Improving Application Availability on Virtual Machines
 
Sna lab prj (1)
Sna lab prj (1)Sna lab prj (1)
Sna lab prj (1)
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 

Viewers also liked

Cellular Trust
Cellular TrustCellular Trust
Cellular Trustlilalia
 
NuevoPeriodismo'08: cómo prosperar en la sociedad de la conversación
NuevoPeriodismo'08: cómo prosperar en la sociedad de la conversaciónNuevoPeriodismo'08: cómo prosperar en la sociedad de la conversación
NuevoPeriodismo'08: cómo prosperar en la sociedad de la conversaciónAlberto Ortiz de Zarate
 
Why E-mail marketing
Why E-mail marketingWhy E-mail marketing
Why E-mail marketingguest4d2f35
 
Chaouen
ChaouenChaouen
Chaouenadilia
 
El ciego
El ciegoEl ciego
El ciegoaleegb
 
Frightful Deeds and Scary Reads
Frightful Deeds and Scary ReadsFrightful Deeds and Scary Reads
Frightful Deeds and Scary Readsteresakatsulos
 
¿Están las tecnologías de la información cambiando nuestras escuelas (I Parte)?
¿Están las tecnologías de la información cambiando nuestras escuelas (I Parte)?¿Están las tecnologías de la información cambiando nuestras escuelas (I Parte)?
¿Están las tecnologías de la información cambiando nuestras escuelas (I Parte)?Hugo Martínez Alvarado
 
Addventure Investorday
Addventure InvestordayAddventure Investorday
Addventure Investordayheckfly
 
Inseguridad En La Ciudad
Inseguridad En La CiudadInseguridad En La Ciudad
Inseguridad En La Ciudaddanielguz25
 
Miedo a la puerta
Miedo a la puertaMiedo a la puerta
Miedo a la puertaaleegb
 

Viewers also liked (20)

Esposa 2.0
Esposa 2.0Esposa 2.0
Esposa 2.0
 
Cellular Trust
Cellular TrustCellular Trust
Cellular Trust
 
Power Point Porti
Power Point PortiPower Point Porti
Power Point Porti
 
Stress
StressStress
Stress
 
LA 4.5 Lillo
LA 4.5 LilloLA 4.5 Lillo
LA 4.5 Lillo
 
NuevoPeriodismo'08: cómo prosperar en la sociedad de la conversación
NuevoPeriodismo'08: cómo prosperar en la sociedad de la conversaciónNuevoPeriodismo'08: cómo prosperar en la sociedad de la conversación
NuevoPeriodismo'08: cómo prosperar en la sociedad de la conversación
 
Why E-mail marketing
Why E-mail marketingWhy E-mail marketing
Why E-mail marketing
 
Chaouen
ChaouenChaouen
Chaouen
 
Avgust
AvgustAvgust
Avgust
 
Ka Gallery 2 009
Ka Gallery 2 009Ka Gallery 2 009
Ka Gallery 2 009
 
El ciego
El ciegoEl ciego
El ciego
 
Miss E Mister
Miss E MisterMiss E Mister
Miss E Mister
 
Frightful Deeds and Scary Reads
Frightful Deeds and Scary ReadsFrightful Deeds and Scary Reads
Frightful Deeds and Scary Reads
 
Respeto Yésica_H
Respeto Yésica_HRespeto Yésica_H
Respeto Yésica_H
 
¿Están las tecnologías de la información cambiando nuestras escuelas (I Parte)?
¿Están las tecnologías de la información cambiando nuestras escuelas (I Parte)?¿Están las tecnologías de la información cambiando nuestras escuelas (I Parte)?
¿Están las tecnologías de la información cambiando nuestras escuelas (I Parte)?
 
Addventure Investorday
Addventure InvestordayAddventure Investorday
Addventure Investorday
 
Arte na Cozinha!
Arte na Cozinha!Arte na Cozinha!
Arte na Cozinha!
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Inseguridad En La Ciudad
Inseguridad En La CiudadInseguridad En La Ciudad
Inseguridad En La Ciudad
 
Miedo a la puerta
Miedo a la puertaMiedo a la puerta
Miedo a la puerta
 

Similar to Virtualization

An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server VirtualisationAlan McSweeney
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentationshabi_hassan
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Louis Göhl
 
Cs seminar 20061207
Cs seminar 20061207Cs seminar 20061207
Cs seminar 20061207Todd Deshane
 
Capito Ardoe House VMWare Presentation
Capito Ardoe House VMWare PresentationCapito Ardoe House VMWare Presentation
Capito Ardoe House VMWare PresentationCapito Livingstone
 
Virtual Pc Seminar
Virtual Pc SeminarVirtual Pc Seminar
Virtual Pc Seminarguest5b5549
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 
cloud basics.
cloud basics.cloud basics.
cloud basics.Mercy joy
 
10 zig combined presentation deck v3
10 zig combined presentation deck v310 zig combined presentation deck v3
10 zig combined presentation deck v3Jennifer Phillips
 
Cio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final VirtualizationCio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final Virtualizationguestc900809
 
Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811Morty Eisen
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMwareJJDiGeronimo
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine Erin Banks
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...Neha417639
 
virtualization.pptx
virtualization.pptxvirtualization.pptx
virtualization.pptxssuser6e6eec
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwebhostingguy
 

Similar to Virtualization (20)

An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentation
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
 
Cs seminar 20061207
Cs seminar 20061207Cs seminar 20061207
Cs seminar 20061207
 
Capito Ardoe House VMWare Presentation
Capito Ardoe House VMWare PresentationCapito Ardoe House VMWare Presentation
Capito Ardoe House VMWare Presentation
 
Virtual Pc Seminar
Virtual Pc SeminarVirtual Pc Seminar
Virtual Pc Seminar
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
VMware 2009
VMware 2009VMware 2009
VMware 2009
 
cloud basics.
cloud basics.cloud basics.
cloud basics.
 
10 zig combined presentation deck v3
10 zig combined presentation deck v310 zig combined presentation deck v3
10 zig combined presentation deck v3
 
Cio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final VirtualizationCio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final Virtualization
 
Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
 
Usenix Invited Talk
Usenix Invited TalkUsenix Invited Talk
Usenix Invited Talk
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
 
virtualization.pptx
virtualization.pptxvirtualization.pptx
virtualization.pptx
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
 

More from jworth

University of Texas
University of TexasUniversity of Texas
University of Texasjworth
 
Gpu Compute
Gpu ComputeGpu Compute
Gpu Computejworth
 
AMD's Lonestar Campus
AMD's Lonestar CampusAMD's Lonestar Campus
AMD's Lonestar Campusjworth
 
AMD Financial Analyst\'s Day
AMD Financial Analyst\'s DayAMD Financial Analyst\'s Day
AMD Financial Analyst\'s Dayjworth
 
Accelerated Computing
Accelerated ComputingAccelerated Computing
Accelerated Computingjworth
 
Amd V Nested Paging
Amd V Nested PagingAmd V Nested Paging
Amd V Nested Pagingjworth
 

More from jworth (7)

University of Texas
University of TexasUniversity of Texas
University of Texas
 
Gpu Compute
Gpu ComputeGpu Compute
Gpu Compute
 
AMD's Lonestar Campus
AMD's Lonestar CampusAMD's Lonestar Campus
AMD's Lonestar Campus
 
AMD Financial Analyst\'s Day
AMD Financial Analyst\'s DayAMD Financial Analyst\'s Day
AMD Financial Analyst\'s Day
 
Accelerated Computing
Accelerated ComputingAccelerated Computing
Accelerated Computing
 
Amd V Nested Paging
Amd V Nested PagingAmd V Nested Paging
Amd V Nested Paging
 
Ces08
Ces08Ces08
Ces08
 

Virtualization

  • 1. Virtualization Technology For AMD Architecture Steve McDowell Division Marketing Manager Computation Products Group AMD steven.mcdowell @ amd.com Geoffrey Strongin Platform Security Architect Computation Products Group AMD geoffrey.strongin @ amd.com
  • 2.
  • 3.
  • 4. Virtualization Virtualization is the pooling and abstraction of resources in a way that masks the physical nature and boundaries of those resources from the resource users
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 13.
  • 14.
  • 15. Core “Pacifica” Architecture Address translation: Page Tables Page Tables or Directories If this is a “Guest Physical” it must be translated to “Host Physical” via the host page tables when nested paging is enabled Input Linear/Virtual Address (LA,VA) Final Host or Guest Physical Address CR3 (Physical Address) Guest or Host Physical Address of next table
  • 16. Core “Pacifica” Architecture Address translation: Modes with virtualization
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Core “Pacifica” Architecture Containerized SMM flow Top: … VMMRUN [rAX] … (Examine Exit Code) … If external SMM (Setup SMM save state) VMRUN [rAX] … Loop Top Host Inst 1 Inst 2 SMI Guest RSM SMM Entry Point SMM Code SMM Save State SMI Intercept RSM Intercept
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.  

Editor's Notes

  1. WinHEC 2005