Adaptive dynamic selection and application of multiple virtualization techniques

ABSTRACT

Autonomous selection between multiple virtualization techniques implemented in a virtualization layer of a virtualized computer system. The virtual machine monitor implements multiple virtualization support processors that each provide for the comprehensive handling of potential virtualization exceptions. A virtual machine monitor resident virtualization selection control is operable to select between use of first and second virtualization support processors dependent on identifying a predetermined pattern of temporally local privilege dependent instructions within a portion of an instruction stream as encountered in the execution of a guest operating system.

This application claims the benefit of U.S. Provisional Application Ser.No. 60/917,732, filed May 14, 2007, which provisional application isincorporated herein by reference in its entirety.

FIELD OF THE INVENTION

One or more embodiments of the present invention relate to computersystem virtualization and, in particular, to a systematic,performance-based method for dynamically selecting and applyingdifferent virtualization techniques to enhance application and guestoperating system execution performance within a virtualizationenvironment.

BACKGROUND

Various forms of computer system virtualization have been used withvarying degrees of success to improve utilization of capabilities ofphysical resources present and available in a given computing systemplatform. In general terms, virtualization enables functionally parallelexecution of multiple computer system environments on a given hardwareplatform. These computer system environments embed guest operatingsystems and, by the virtualization, can represent, to varying degrees,computing platforms dissimilar from the underlying physical systemplatform.

Virtualization systems are typically implemented using a virtual machinemonitor (VMM), also frequently referred to as a hypervisor, thatprovides support and coordinated control over one or more co-executedvirtual machines (VMs). Each virtual machine represents a discreteexecution environment that encapsulates a virtual platform, guestoperating system, and address space for the execution of applicationprograms. Over the years, various specific approaches for implementingvirtual machine monitors have been proposed and implemented.

Conventional approaches to virtualization that can, at leasttheoretically, implement a virtual machine monitor includetrap-and-emulate, para-virtualization, and binary translation.Trap-and-emulate virtualization relies on a platform central processingunit (CPU) to implement a privilege model that will raise an exceptionwhenever a privilege dependent instruction is executed in anunprivileged context. Privilege dependent instructions can be generallyclassified as those instructions that directly modify a security stateof the executing CPU, as those instructions whose execution behaviorvaries dependent on the privilege level of the execution context, and asthose instructions that can be used to reveal the security state of theCPU to enable conditional program execution. In a so-called classicallyvirtualizable computer architecture, all privilege dependentinstructions will raise an exception when executed in an unprivilegedcontext.

A classical trap-and-emulate virtualization system provides for directexecution of a guest operating system within a virtual machine, thoughat an unprivileged security level. In this system, the virtual machinemonitor is executed at a privileged level, and privilege exceptionsraised in executing the guest operating system are trapped by thevirtual machine monitor. The trapped instruction and related executioncontext are then evaluated by the virtual machine monitor as needed toenable emulation of the intended guest operating system function thatinvoked the trapped exception.

In greater detail, conventional operating systems are nominallyimplemented to make use of a supervisor/user privilege system. Theoperating system kernel and certain essential services execute withsupervisory rights, while non-essential operating system and userapplications execute with reduced user rights. In a typical x86-basedarchitecture, ring-0, 1, 2, and 3 privilege levels are supported byhardware controls. Operating systems conventionally execute at thering-0 privilege level, while user applications commonly execute atring-3. Some specialized user-level applications can be run at ring-land, for reasons not relevant here, ring-2 is rarely if ever used. Thedistinction between ring-0 and the higher, less privileged rings isnominally enforced by hardware architecture security controls by raisingprivilege exceptions if certain privilege dependent instructions areexecuted outside of ring-0. Conventionally, a privilege exception istreated as a non-reentrant event, since a user level program thatexecutes a privileged instruction is typically terminated as a securityprecaution. Still, x86-based architectures do support the ability torestart execution of an instruction that invokes a privilege trapexception. Generation of a privilege exception results in a contextswitch to the ring-0 privilege level where the exception is handled byan associated exception handler.

The context switch and subsequent emulation operation of the virtualmachine monitor imposes a performance overhead in the virtualizedexecution of guest operating systems. Optimizing this overheadperformance is thus a concern in all virtual machine implementations.Unfortunately, the context switch and emulation overhead is not the onlyor even principal problem with trap-and-emulate virtualization systems.Rather, the principal problem is that the conventionally prevalent x86architectural model is not a classically virtualizable architecture.While many privilege dependent instructions will appropriately generateprivilege exceptions, other standard x86 instructions cannot be made togenerate privilege exceptions for activities that should be confined toring-0 execution. For example, various x86 instructions can be used tomodify the contents of certain x86 CPU-internal registers that containcontrol bits modifiable only in a ring-0 execution context. Other bitsin these registers may be validly written outside of ring-0 execution.Any x86 instruction that attempts to modify the ring-0 constrainedcontrol bits outside of ring-0 execution will not only fail to generatea privilege exception, but the attempted modification will be silentlyignored. Further, where the modification is attempted specifically by adeprivileged guest operating system kernel, the intended kernel behaviorwill not be realized. Consequently, the execution behavior of theseinstructions differs based on the privilege level of execution.

Another problem can arise for guest operating system modules intended toexecute in both privileged and non-privileged circumstances. Given thatthe guest operating system is executed in user, rather than supervisorymode, any run-time differentiating test for privilege-level statusimplemented by such a module will always identify user mode execution.The inability to execute privileged operations as intended in the designand implementation of the module will compromise the function of themodule and guest operating system as a whole.

Since the conventional x86 architecture does not raise exceptions onexecution of all privilege dependent instructions, the x86 architectureis not classically virtualizable. A further discussion of these problemscan be found in the article, Robin, J. S. & Irvine, C. E., “Analysis ofthe Intel Pentium's Ability to Support a Secure Virtual MachineMonitor,” Proceedings of the 9^(th) USENIX Security Symposium, Denver,Colo., Aug. 2000.

Para-virtualization takes a different approach to dealing with theexistence of privilege dependent instructions in non-classicallyvirtualizable architectures. As with trap-and-emulate virtualization,para-virtualization systems implement a virtual machine monitor toprovide supervisory control over the co-execution of the virtualmachines. While the guest operating systems similarly executedeprivileged on the underlying platform, para-virtualization requiresthe guest operating systems to be directly aware of, and invoke, thevirtual machine monitor to handle circumstances involving privilegedependent instructions. Since conventional operating systems areimplemented without provision for interacting with a virtual machinemonitor, standard para-virtualization implementations require the guestoperating systems to be specifically modified to support virtualization.That is, typically source-code level modification of a guest operatingsystem is required at every point where execution of a privilegedependent instruction in a deprivileged context could result in anundesirable behavior.

The para-virtualization virtual machine monitor typically containslibrary routines, accessible from the guest operating systems, thatappropriately emulate necessary guest operating system privilegedfunctions. A current, conventional implementation of apara-virtualization virtual machine monitor, known as Xen 3.0, isavailable from XenSource, Inc., based in Palo Alto, Calif. A drawback topara-virtualization is a requirement to modify the guest operatingsystem core kernel to support virtual machine monitor interactions.Conventionally, each different type and version of each guest operatingsystem supported must be modified. In many instances, access to therequired components of the operating system is not available. Given thecore kernel location of the modifications required, a significanttesting burden is incurred to ensure that kernel operations are notunintentionally affected directly or indirectly in the ability tosupport consistent behavioral execution of higher operating systemlayers and applications.

Binary translation-based virtualization systems, like trap-and-emulateand para-virtualization systems, typically implement a virtual machinemonitor to functionally manage and coordinate execution of guestoperating systems within virtual machines. The virtual machine monitorexecutes in a privileged context and manages the execution of the guestoperating systems. As described in, for example, U.S. Pat. No.6,397,242, issued to Devine et al., and assigned to the assignee of thepresent application, the virtual machine monitor performs a run-timeanalysis of the instruction execution stream to identify occurrences ofprivilege dependent instructions that, if executed unaltered, couldresult in undesirable system behavior. The run-time analysis isperformed by a binary-to-binary translator that emits a functionallyequivalent instruction stream that incorporates emulations of theprivilege dependent instructions. Depending on the nature and use of aprivilege dependent instruction, the binary translation results producessome combination of rewritten instructions and call-outs to libraryroutines appropriate to emulate the function of the guest operatingsystem intended to be performed by the privilege dependent instructionsegment. The resulting translated instruction stream is preferablycached, and thereafter executed in replacement of the correspondingportion of the guest operating system.

Although the initial processing and binary translation of an instructionstream imposes a performance burden, subsequent execution of thetranslated instruction stream from the translation cache achieves nearnative performance. Given that relatively small portions of modernoperating systems are predominantly and repeatedly executed, the overallperformance gains realizable using binary translation-basedvirtualization is substantial. Binary translation-based virtualizationsystems thus realize the benefit of supporting non-classicallyvirtualizable architectures without requiring the source-level guestoperating system modifications of para-virtualization and without theongoing performance burden of exception handling overhead every time aprivilege dependent instruction is executed, as incurred under purelytrap-and-emulate virtualization.

The existence of privilege dependent instructions in non-classicallyvirtualizable architectures, such as the x86 architecture, has been longrecognized. Only recently, however, a number of hardware-basedextensions of the x86 architecture have been proposed and, to varyingdegrees, implemented to support partitioning virtualization. Inparticular, Intel Corporation has implemented a virtualizationtechnology, or VT, extension that provides hardware-based support forpartitioning virtualization in an otherwise non-classicallyvirtualizable architecture. Other vendors, such as Advanced MicroDevices, Inc., have introduced similar extensions in theirmicroprocessor designs. Given the functional similarity, for purposes ofdiscussing the present invention, all of the hardware-basedvirtualization extensions can be generically referred to as VTextensions.

In summary, VT introduces a privilege overlay system defining twoprivilege classes. Relative to the conventional x86 privilege model, anew VMX non-root class, functionally containing a standard x86 ring-0,1, 2, 3 privilege model, has been added. The conventional x86 privilegemodel is identified as the VMX root class. In use, a virtual machinemonitor implementing a VT trap handler will execute in the VMX rootring-0. By executing guest operating systems in the VMX non-root ring-0,many problems with privilege dependent instructions are resolved; theguest operating systems run in their intended privileged execution mode.Remaining virtualization issues, specifically those arising from theconventionally non-classically virtualizable nature of the x86architecture, are handled by a controlled deprivilegization of the VMXnon-root ring-0 relative to the VMX root ring-0. That is, VT implementsVM exit and VM entry operations that encapsulate transitions between theVMX non-root and root privilege states to add exception handling forthose privilege dependent instructions and events that do notconventionally raise privilege exceptions. The execution of thesenon-classically virtualizable instructions and occurrence of certainoperating conditions, particularly related to memory paging, interrupthandling and programmed I/O operations, will, either automatically, oras determined by VT-defined control vectors, force a VM exit transition.This allows a VT trap handler implemented within the virtual machinemonitor to handle these specific conditions consistently with respect tothe parallel array of virtual machines, and thereby maintain overalloperational integrity.

Although developed as a more direct approach to supporting partitioningvirtualization, and substantially simplifying the implementation ofvirtual machine monitors, there are inherent limitations to the use ofVT and other, similar, hardware-based virtualization support techniques.In particular, the fundamental operation of VT converts many of theprivilege dependent instructions into the equivalent of, if not actual,heavy-weight context switches. That is, while essentially implemented inhardware, the VM exit and VM entry transitions require fairly extensiveamounts of state information to be preserved and restored from virtualmachine control structures on both VM exit and VM entry transitions. Thesignificant processing burden of VM exit and VM entry transitions can beparticularly problematic where privilege dependent instructions occur inperformance sensitive execution flows within typical guest operatingsystems. For example, several privilege dependent instructions arecharacteristically invoked in the management of page tables. Inexecution of conventional operating system kernels, page tablemanipulation is rather frequently performed, given the conventionalpresumption that performance cost is negligible and optimizing memoryaccess is particularly desirable. A VT-type hardware-basedvirtualization support system as implemented in conventional virtualmachine monitors will typically impose a VM exit and VM entry transitionon these page table modifications. The overall result is that, foroperating systems that frequently invoke privilege dependentinstructions, VT-type systems will incur virtualization overheads thatare not only significant, but noticeable in practical use.

In addition, a substantial processing burden is imposed by the virtualmachine monitor being required to evaluate, for purposes of emulation,the intended operation of the privilege dependent instruction thatinitiates each VM exit. Although a VM exit transition capturessignificant state information as part of the hardware implemented VMexit transition, the virtual machine monitor resident VM exit handlermust determine anew the intended operation and execution context of theprivilege dependent instruction. Typically, the virtual machine monitoroperates to decode the privilege dependent instruction and furtheranalyze potentially disparate aspects of the execution context of theguest operating system to correctly characterize and implement anemulated execution of a privilege dependent instruction. Since thisdecode and analysis is performed following from each VM exit transition,the VT analysis and emulation of trapped privilege dependentinstructions is also a substantial source of virtualization overhead.

VT-type hardware-based virtualization does, however, provide significantbenefits in certain areas relative to para-virtualization and binarytranslation virtualization techniques. Relative to para-virtualization,VT virtualization enables execution of unmodified guest operatingsystems. In comparison to binary translation virtualization, VTvirtualization does not impose initial execution overhead, and allowssystem calls by application programs to the guest operating systems tobe executed without intervention by the virtual machine monitor. Also,since VT virtualization does not require a translation cache, a VTvirtual machine monitor will require less memory.

SUMMARY OF THE INVENTION

One or more embodiments of the present invention provide an adaptiveautonomous system of dynamically optimizing realized executionperformance of virtual machines. In accordance with one or more suchembodiments, this is achieved by providing for autonomous selectionbetween multiple virtualization techniques implemented in a virtualmachine monitor to optimize the execution performance of a virtualmachine. The virtual machine monitor implements multiple virtualizationsupport processors that each provide for comprehensive handling ofpotential virtualization exceptions. For example, a virtual machinemonitor resident virtualization selection control is operable to selectbetween use of first and second virtualization support processorsdependent on identifying a predetermined pattern of temporally localprivilege dependent instructions within a portion of an instructionstream as encountered in the execution of a guest operating system.

Advantageously, the execution performance of individual virtualmachines, whether executed alone or concurrently with other virtualmachines on a common hardware platform, is individually optimized. Inaddition, virtual machine execution performance is optimized dynamicallywithout requiring the virtual machine monitor to be reloaded orrequiring a restart of any virtual machine. In further addition, thevirtualization performance analysis and, when determined appropriate,switching between different virtualization techniques is performedentirely within the virtual machine monitor. The collection ofperformance data and implementation of the virtualization techniqueswitch are transparent to the virtual machine, including itsencapsulated guest operating system, executing applications, and usersof the virtual machine. In still further addition, any number ofdifferent virtualization techniques can be dynamically evaluated andused in accordance with one or more embodiments of the presentinvention. In particular, multiple different hardwarevirtualization-based techniques can be supported by a virtual machinemonitor without impacting the optimally selected virtualizationtechnique. In still further addition, the virtualization overhead costsassociated with different virtualization techniques are determineddynamically, based at least in part on distinct virtualization supportoperations required of the virtual machine monitor as determined by theactual execution of a guest operating system. The selection of anoptimum virtualization technique will therefore depend on the actualoperations required of the guest operating system by guest executedapplications. As such, this enables selection of an optimalvirtualization technique that dynamically reflects the actual andevolving operating conditions of the virtual machine.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of major functional components of a generalvirtual memory system in a computer system platform suitable forimplementing one or more embodiments of the present invention;

FIGS. 2A and 2B present diagrams illustrating virtual addresses asimplemented in x86 architecture systems and the translation of virtualaddresses to corresponding physical addresses, using page tables;

FIG. 3 is a block diagram illustrating a logical arrangement of multiplevirtual machines presented for concurrent execution on a computer systemplatform in accordance with one or more embodiments of the presentinvention;

FIGS. 4A and 4B show privilege level models used in accordance with apreferred embodiment of the present invention;

FIG. 5 is a block diagram showing memory space allocation and controlfunctions associated with execution of multiple virtual machines inaccordance with one or more embodiments of the present invention;

FIG. 6 is a block diagram that illustrates virtual machine exit (VMexit) and virtual machine entry (VM entry) transition paths for ahardware-based virtualization system in accordance with a preferredembodiment of the present invention;

FIGS. 7A and 7B show a diagram that helps illustrate differences betweenbinary translation and VT handling of privilege dependent instructionsequences within an instruction stream;

FIG. 8 is a block diagram of major functional components of a virtualmachine monitor that implements dynamic selection and application ofmultiple virtualization techniques, in particular between a binarytranslation technique and a VT technique, in accordance with one or moreembodiments of the present invention;

FIG. 9 is a block diagram detailing operation of a performance monitorin accordance with one or more embodiments of the present invention;

FIGS. 10A, 10B and 10C present a diagrammatic representation of theapplication of multiple virtualization techniques, in particular binarytranslation and VT, to otherwise privilege dependent instructionsequences within an instruction stream in accordance with one or moreembodiments of the present invention;

FIG. 11 is a flow diagram illustrating a first preferred embodiment ofthe present invention in performing dynamic, block oriented, selectionand application of multiple virtualization techniques;

FIG. 12 is a flow diagram illustrating a second preferred embodiment ofthe present invention in performing dynamic, hot-path oriented,selection and application of multiple virtualization techniques; and

FIG. 13 is a flow diagram illustrating a preferred embodiment of amethod for implementing dynamic transition between multiplevirtualization techniques in accordance with the present invention.

DETAILED DESCRIPTION

One or more embodiments of the present invention provide an optimizationin selecting virtualization techniques, as implemented in a virtualmachine monitor, used in support of execution of a virtual machine. Forpurposes of simplifying the following detailed description, likereference numerals are used to designate like parts depicted in one ormore of the figures.

FIG. 1 is a block diagram of major functional components of a generalvirtual memory system in computer 10 suitable for implementing one ormore embodiments of the present invention. As shown in FIG. 1, computer10 includes central processor unit (CPU) 12, memory management unit(MMU) 14 containing translation look-aside buffer (TLB) 16, and randomaccess memory (RAM) based main memory 18 providing operation storage ofa plurality of page tables 20 and operating system (OS) 22. As furthershown in FIG. 1, computer 10 further includes direct memory access (DMA)controller 24, peripheral devices 26, and memory mapped I/O devices 28,wherein DMA controller 24 supports data transfers between main memory18, peripherals devices 26, including persistent program and datastorage devices, and memory mapped I/O devices 28. As still furthershown in FIG. 1, interrupt controller 30 provides event notificationsupport to CPU 12. Various physical implementations of computer 10 areconsidered equivalent for purposes of embodiments of the presentinvention such as CPU 12 representing multiple processing units,including potentially multi-core processors, and memory management unit14 implementing other memory allocation algorithms including, forexample, non-page table-based schemes. Embodiments of the presentinvention are not restricted to a particular CPU 12 architecture orinstruction set.

CPU 12 functions to execute programs, including OS 22 and associatedapplication programs also resident in the main memory 18, bysequentially processing a stream of instructions and data read from mainmemory 18. As is conventional, the stream of instructions can andtypically will involve the transfer of data between various peripheraldevices 26, presented as hardware registers located within a hardwareI/O address space and other peripheral devices 28 accessible through aportion of the main memory address space. Interrupt controller 30provides CPU 12 with notice of external events, typically generated bythe various peripheral devices 26, 28, to invoke specialized interrupthandlers by CPU 12 to manage peripheral data transfers.

CPU 12 conventionally implements a virtual address space which may havevarious different types of organization such as linear or segmented, andutilizes MMU 14 to provide for virtual to physical address translation.For embodiments of the present invention, a segmented virtual addressspace is preferred. Also, as is conventional, physical memory is managedwithin the virtual address space as a set of pages. These pages, asloaded within main memory 18, may not be physically continuous, althougha logically contiguous relation is typically maintained in the virtualaddress space. During execution, CPU 12 generates addresses within thevirtual address space to read instructions and transfer related datawith respect to main memory 18. MMU 14 is responsible for determiningwhether the corresponding page is actually resident in main memory 18; apage fault exception is generated if the page is not resident. Theexception is caught as an interrupt to CPU 12, and a page faultexception handler resident in OS 22 is executed to load the missingpage, typically from persistent storage peripheral 26. When the pagetransfer is complete, execution of the program resumes throughre-execution of the instruction that resulted in the page fault.Nominally, MMU 14 will then determine that the page is present and thememory access will complete successfully.

As further described below, MMU 12 conventionally uses page tables 20 totranslate virtual addresses into physical addresses. Page tables 20maintain a mapping, typically implemented using a hierarchicalorganization, of virtual addresses to physical pages that contain thecorresponding physical addresses. In typical virtual memory systems,multiple page table 20 accesses are required to resolve the mapping of avirtual address to a physical address. TLB 16 functions as a cache forpage table 20 entries and thereby reduces the number of external memoryaccesses required by the virtual memory system. If a mapping is notalready cached in TLB 16, then MMU 14 must perform a page table walk toretrieve the correct reference to the required physical page.Fortunately, when CPU 12 is executing a computer program, most memoryaccesses will be to a limited number of pages within main memory 18.

FIGS. 2A and 2B present diagrams illustrating virtual addresses, asimplemented in x86 architecture systems, and the translation of virtualaddresses to corresponding physical addresses using page tables. Inparticular, FIGS. 2A and 2B illustrate the translation of 32-bit virtualaddress 40 to a reference to the physical memory page containing theaddressed location. In a typical implementation, virtual address 40includes 10-bit page directory index (PDIdx) 42, 10-bit page table index(PTIdx) 44, and 12-bit page offset 46. As shown in diagram 50 of FIG.2B, page directory index 42 defines an offset from a standard x86control register CR3 into page directory table 52 to locate specificpage directory entry (PDE) 54. Page directory entry 54 identifies pagetable 56 in the set of page tables 20. Page table index 44 is used toselect particular page table entry (PTE) 58 that identifies particularphysical page 60. Offset 46 locates particular addressed data 62 withinselected page table 60.

TLB 16 is used by MMU 14 to cache the results of each distinct virtualaddress translation, based on the values of page directory index 42 andpage table index 44. Thus, before performing an explicit virtual addresstranslation, MMU 14 checks TLB 16 for an entry matching the combinedvalue of page directory index 42 and page table index 44. The result ofa match will be the physical address of corresponding memory page 60. Asingle offset 46 biased access is then required to retrieve the actualdata. Conversely, where a match is not found, MMU 14 is required toperform multiple memory accesses required to walk through page tables 20to locate and evaluate the mapped relation between the page directoryand page tables 52, 56. The eventual result of the page table walk,specifically the value of page table entry 58 is stored withcorresponding page directory index 42 and page table index 44 in TLB 16.

FIG. 3 is a block diagram illustrating logical representation 70 ofmultiple virtual machines present in a virtual address space supportedby CPU 12 as supported by computer 10. As shown in FIG. 3, each ofvirtual machines 72 _(1-N) encapsulates a guest operating system (guestoperating systems 74 _(1-N), respectively) that, in turn, supports anapplication execution space (application execution spaces 76 _(1-N),respectively). For preferred embodiments of the present invention, guestoperating systems 74 can be like or different instances of Microsoft®Windows™, Linux™ and Netware™-based operating systems. Other guestoperating systems can be equivalently used. In accordance with preferredembodiments of the present invention, each of virtual machines 72 _(1-N)is managed by a virtual machine monitor (virtual machine monitors 78_(1-N), respectively) that internally implements executable componentsnecessary to support multiple distinct virtualization techniques.Virtual machines 72 _(1-N) and virtual machine monitors 78 _(1-N) arepreferably implemented in a version of an ESX Server productmanufactured and distributed by VMware, Inc., Palo Alto, Calif. Usespecifically of the ESX Server product is not required in the practiceof embodiments of the present invention.

For preferred embodiments of the present invention, each of virtualmachine monitors 78 _(1-N) provide both binary translation and VT-basedvirtualization support. In alternate embodiments of the presentinvention, one or more of virtual machine monitors 78 _(1-N) mayimplement only or additionally include support for para-virtualization,where corresponding ones of guest operating systems 74 _(1-N) have beenmodified to directly utilize para-virtualization support provided bycorresponding ones of virtual machine monitors 78 _(1-N). The provisionof support for multiple virtualization techniques within an instance ofvirtual machine monitors 78 _(1-N), combined with a component enablingdynamic switching between those virtualization techniques, enables oneor more embodiments of the present invention to independently optimizeexecution of each of virtual machines 72 _(1-N) appropriate for theparticular ones of guest operating system 74 _(1-N) and specificoperational behavior of the application programs executed within thecorresponding ones of virtual machines 72 _(1-N).

FIG. 4A shows binary translation privilege model 80 used in accordancewith a preferred embodiment of the present invention. For x86-basedprocessors, a 2-bit defined privilege protection system defines a levelor ring-0 for most-privileged software, and a level or ring-3 for theleast privileged. The privilege bits are defined as part of segmentregister values assigned to memory segments that functionally containguest operating systems 74 _(1-N) and virtual machine monitors 78_(1-N). As is known, a privilege level determines whether systemfunction oriented instructions will generate a privilege exception whenexecuted by the processor. The privilege level also controls whethercertain control registers, including page table pointers and segmentregisters, are modifiable without generating a privilege exception.Where a conventional operating system executes at a ring-0 privilegelevel, as shown in FIG. 4A for preferred binary translation privilegemodel 80, virtual machine monitors 78 _(1-N) are instead executed atring-0. Under control of virtual machine monitors 78 _(1-N), variousportions of guest operating systems 74 _(1-N) are executed at the sameor lesser privilege levels. Execution privilege level is determined byvirtual machine monitors 78 _(1-N) based on a specific binarytranslation applied to a corresponding portion of guest operating system74 _(1-N). As further shown in FIG. 4A, application programs executedwithin application execution spaces 76 _(1-N) of virtual machines 72_(1-N) execute at ring-3.

For preferred embodiments of the present invention, functionalsegregation of guest operating systems 74 _(1-N), ring-3 executedapplications and virtual machine monitors 78 _(1-N) within virtualmachines 72 _(1-N) are performed as described in Virtualization SystemIncluding a Virtual Machine Monitor For a Computer with a SegmentedArchitecture, U.S. Pat. No. 6,397,242, issued to Devine et al. andassigned to the assignee of the present invention, which is herebyincorporated by reference. In summary, within individual address spacesallocated to virtual machines 72 _(1-N), segments containing virtualmachine monitors 78 _(1-N) are assigned to high memory addresses andguest operating system 74 _(1-N) segments to low memory addresses.Memory space available to individual guest operating systems 74 _(1-N)is constrained, by truncation of appropriate segmentation controlregister values held in relation to each of virtual machines 72 _(1-N),to prevent overlap with the segmentation address space of virtualmachine monitors 78 _(1-N). In accordance with one or more embodimentsof the present invention, the assigned privilege level of guestoperating systems 74 _(1-N) are separately modifiable by suitablyre-writing privilege control bits associated with the differentsegments.

To ensure functional segregation of individual guest operating systems74 _(1-N) and virtual machine monitors 78 _(1-N), and further as betweenvirtual machines 72 _(1-N), virtual machine monitors 78 _(1-N) manageallocation and use of memory pages by guest operating systems 74 _(1-N).Normally, each of guest operating systems 74 _(1-N) would expect to haveaccess to the full virtual address space of CPU 12. To preserve addressspace integrity, virtual machine monitors 78 _(1-N) actively constrainguest operating systems 74 _(1-N) from accessing or allocating memorywithin virtual machine monitors 78 _(1-N) or other virtual machines 72_(1-N). This is achieved by each of virtual machine monitors 78 _(1-N)establishing shadow structures that represent various on-CPU registersand in-memory data structures of the respective guest operating systems74 _(1-N). These data structures constrain the manner and extent bywhich guest operating systems 74 _(1-N) can access the virtual addressspace of CPU 12. In particular, shadow structures are maintained forguest-level primary data structures involved in segmentation and pagetable management as performed by guest operating systems 74 _(1-N).

FIG. 5 is a block diagram showing memory space allocation and controlfunctions associated with execution of multiple virtual machines 72_(1-N) in accordance with one or more embodiments of the presentinvention. As generally indicated in FIG. 5, x86 architecture 100includes on-CPU registers that store address pointers to globaldescriptor (GDT), local descriptor (LDT), and interrupt descriptor (IDT)tables 102. A global descriptor table nominally stores segmentdescriptors that each identifies a memory segment, a correspondingtwo-bit segment privilege level value, and segment read/writepermissions. Accesses, particularly, write accesses by guest operatingsystems 74 _(1-N) to the on-CPU descriptor table registers or to globaldescriptor table (GDT), local descriptor table (LDT), and interruptdescriptor tables (IDT) 102 of guest operating systems 74 _(1-N) resultin a privilege exception. When such an exception is trapped by one ofvirtual machine monitors 78 _(1-N), shadowed register or data structure102′ is referenced to enable proper functional emulation of theoperation. In currently preferred embodiments, the IDT table is notdirectly shadowed. Rather, virtual machine monitors 78 _(1-N) read andtransform, as appropriate for each corresponding one of guest operatingsystems 74 _(1-N), a logical representation of the contents of the IDTtable in response to IDT modification exceptions. As part of theemulation, the creation and subsequent modification of memory segmentscan be actively monitored by virtual machine monitors 78 _(1-N) toensure that memory space integrity is maintained.

As further shown in FIG. 5, x86 architecture 100 also employs pagetables 104 to manage virtual to real address translations within thesegmented address space. Virtual machine monitors 78 _(1-N) maintainpage tables 104 that define the operating environment of thecorresponding virtual machine monitor 78 _(1-N) instances. Shadow pagetables 106 are maintained generally in parallel with guest page tables106′ implemented within a corresponding one of guest operating system 74_(1-N). Normal operating system actions to access a memory pageidentified through page tables 106′ are trapped through use of theprivilege control system. The trap operation allows virtual machinemonitors 78 _(1-N) to first qualify and, as appropriate, load orotherwise manage availability of an accessed memory page. That is, wherea memory page requested by one of guest operating systems 74 _(1-N) isdetermined not to be present by a corresponding one of virtual machinemonitors 78 _(1-N) based on shadow page tables 106, the access isqualified and, as appropriate, the corresponding page is loaded by thatone of virtual machine monitors 78 _(1-N). Both shadow and guest pagetables 106, 106′ are updated. Execution of that one of guest operatingsystems 74 _(1-N) is then resumed with the result that the requestedpage is found. Conversely, where access to the requested page is notappropriate, as determined by virtual machine monitor 78 _(1-N), asuitable access exception fault is forwarded to the corresponding one ofguest operating systems 74 _(1-N) to handle as appropriate for that oneof guest operating systems 74 _(1-N).

FIG. 4B shows preferred VT privilege model 90 used in accordance with apreferred embodiment of the present invention. Functionally, VTprivilege model 90 defines VMX root 92 and VMX non-root 94 operationmodes for CPU 12, each further represented by a set of ring-0, 1, 2, 3privilege levels. VMX non-root 94 is deprivileged relative to VMX root92, regardless of privilege level, to enable trap support for certainx86 architecture instructions and events that did not conventionallyinvoke privilege traps. Otherwise, VMX non-root 94 operates as aconventional x86 privilege model. This allows execution of virtualmachine monitors 78 _(1-N) at the ring-0 privilege level of VMX root 92,with full control of platform resources, while guest operating systems74 _(1-N) and application programs provided within application executionspaces 76 _(1-N) of virtual machines 72 _(1-N) execute at their intendedprivilege levels within VMX non-root 94.

FIG. 6 is a block diagram 110 that illustrates virtual machine exit (VMexit) and virtual machine entry (VM entry) transition paths for ahardware-based virtualization system in accordance with a preferredembodiment of the present invention. Referring to FIG. 6, the functionof the VMX root 92 privilege level is to trap otherwise privilegedependent x86 instructions. Many privilege dependent problems areavoided by executing guest operating systems 74 _(1-N) at the ring-0level of VMX non-root 94. Then, remaining privilege dependent behaviorsare handled by hardware-initiated transitions to virtual machinemonitors 78 _(1-N) executing in the VMX root 92 ring-0 privilege level.In particular, VT provides for privilege traps which force virtualmachine exit transitions on the occurrence of privileged registerwrites, protected memory accesses and system interrupt events. Thus,from nominal VM execution state 112 of one of guest operating systems 74_(1-N) within a virtual machine, a hardware-implemented VM exittransition procedure provides for saving the CPU 12 state into virtualmachine control structure (VMCS) 114. Included in the CPU 12 saved stateis an identification of an instruction or other event that causedinvocation of the VM exit transition. Also included in the CPU 12 savedstate are other virtual machine state information, such as the contentsof descriptor caches for segment registers used by the one of virtualmachines 72 _(1-N). As one can readily appreciate, this effectivelyenables the corresponding one of virtual machine monitors 78 _(1-N) toexamine the execution context of the corresponding one of guestoperating systems 74 _(1-N) as it exists at the point in time when a VMexit transition occurs.

Virtual machine control structure 114 is also used to store theoperating state of the one of virtual machine monitors 78 _(1-N) whilethe corresponding one of virtual machines 72 _(1-N) is executing. Thenthe one of virtual machine monitors 78 _(1-N) state is restored to CPU12 to complete the VM exit transition procedure and allow virtualmachine monitor 78 _(1-N) to begin execution (indicated at 116). Theresumed execution enables the one of virtual machine monitors 78 _(1-N)to inspect and manage, as appropriate, conditions that caused the VMexit transition. For the most common source of VM exit transition, therequired virtual machine monitor action is to manage memory spaceallocations available to the corresponding one of guest operatingsystems 74 _(1-N), to initially handle and functionally route interruptsamong the different virtual machines 72 _(1-N), and to manage programmeddata transfers through defined I/O ports 26 and mapped I/O addresses 28.

Once a virtual machine monitor 78 _(1-N) has completed the supervisorytasks required after the VM exit transition, virtual machine monitor 78_(1-N) invokes a VM entry transition procedure. The VM entry transitionprocedure is implemented by storing the current virtual machine monitor78 _(1-N) state to virtual machine control structure 114 and restoringthe virtual machine state existing in virtual machine control structure114 to CPU 12. Execution of the corresponding guest operating system 74_(1-N) is then resumed.

The inventors recognize that different virtualization techniques forvirtualizing a complete computing system present differentworkload-dependent performance characteristics that reflect differentefficiencies in supporting execution of guest operating systems (forexample, guest operating systems 74 _(1-N) shown in FIG. 3).Furthermore, overall performance costs of the different virtualizationtechniques will also be dependent on the frequency that virtual machinemonitors (for example, virtual machine monitors 78 _(1-N) shown in FIG.3) are called upon to support virtualization of guest operating systems74 _(1-N). That is, dependent in part on the type of guest operatingsystem present in a virtual machine (for example, virtual machines 72_(1-N) shown in FIG. 3) and in part on particular applications executedand the level and nature of user requests presented to virtual machines72 _(1-N), a qualitative improvement in performance can be achieved byappropriate selection of virtualization technique implemented by virtualmachine monitors 78 _(1-N).

FIGS. 7A and 7B show diagram 120 that helps illustrate differencesbetween binary translation and VT handling of privilege dependentinstruction sequences within an instruction stream. As generallyindicated in FIG. 7A, for a given portion of a program instructionstream 122, binary translation 124 of sequence 126 containing aprivilege dependent instruction incurs distinctive overhead costs from anumber of sources. The stereotypical overhead includes binarytranslation process 124 itself, i.e., the typical execution ofadditional processor instructions needed to functionally emulate theprivilege dependent instruction, and the ongoing cost of monitoring orotherwise managing the selection of the translated code for execution.As comparatively indicated in FIG. 7B for the same program instructionstream 122, VT-based virtualization incurs a different stereotypicaloverhead. On execution of the privilege dependent instruction, requiredVT processing 128 incurs the relatively significant overhead ofimplementing VM exit and subsequent VM entry transitions, and theintervening execution of the exception handler and emulation routinesnecessary to identify and functionally execute the privilege dependentinstruction.

While performance cost of the initial binary translation 124 oftranslated sequence 126 is significant, a time averaged performance costcan be relatively minor in circumstances where sequence 126 isfrequently executed. Conversely, where instruction stream 122 is ofsufficiently infrequent execution in the ongoing execution of a virtualmachine (for example, one of virtual machines 72 _(1-N)), VTvirtualization may be preferred. A performance cost analysis may be usedto compare the overhead cost of VM exit and VM entry transitions on eachexecution of a privilege dependent instruction to the cost of an initialbinary translation 124 and the related costs of managing the memoryimage of translated sequence 126.

As further recognized by the inventors, proper selection of an optimalvirtualization technique will vary: (a) as between different virtualmachines 72 _(1-N); (b) depending on time-based loading factors; and (c)depending on the particular nature and context within which particularprivilege dependent instructions are encountered. In accordance with afirst preferred embodiment of the present invention, performance costfactors are accumulated and analyzed at time-based intervals, onoccurrence of well-defined events, or a combination where eventinstances can be selectively skipped if an event frequency exceeds atime-based threshold. When the analysis is performed, a likely optimalvirtualization technique is selected and implemented by a virtualmachine monitor (for example, one of virtual machine monitors 78 _(1-N))for its corresponding virtual machine (for example, the correspondingone of virtual machines 72 _(1-N)).

In accordance with a second preferred embodiment of the presentinvention, additional performance cost factors are collected to identifythe existence of predictable code execution paths of temporally local,overhead-inducing operations encountered in the execution of a guestoperating system (for example, one of guest operating systems 74_(1-N)). As further recognized by the inventors, instruction sequencescontaining certain patterns of privilege dependent instructions arepredictively machine recognizable. Temporally local means that asequence of privilege dependent instructions, while not necessarilyconsecutive, occur in an ordered pattern in close proximity to oneanother relative to virtualization overheads involved. That is, apattern that contains non-overlapping sub-patterns that, if consideredseparately, could under differing loading conditions be optimallyhandled in terms of performance using different virtualizationtechniques, the sub-patterns are preferably considered temporallyseparate. Temporal locality thus depends in part on a particular patternor patterns involved. Similar to the first preferred embodiment, where apattern is predictively recognized, a cost optimal virtualizationtechnique determined for the pattern is selected and implemented by avirtual machine monitor (for example, one of virtual machine monitors 78_(1-N)) for its corresponding virtual machine (for example, thecorresponding one of virtual machines 72 _(1-N)).

FIG. 8 is a block diagram of major functional components (i.e., theprincipal architecture) of virtual machine monitor 78 that implementsdynamic selection and application of multiple virtualization techniques,in particular between a binary translation technique and a VT technique,in accordance with one or more preferred embodiments of the presentinvention. As shown in FIG. 8, virtual machine monitor 78 preferablyincludes both binary translation component 124 and VT processingcomponent 128. Binary translation component 124 is preferablyimplemented to support dynamic evaluation and selective binarytranslation of an instruction stream into a translation cache forsubsequent use. Such a binary translation component is described in U.S.Pat. No. 6,704,925 entitled “Dynamic Binary Translator with a System andMethod for Updating and Maintaining Coherency of a Translation Cache,”issued to Bugnion and assigned to the assignee of the present invention,which patent is hereby incorporated by reference.

Binary translation component 124 comprises address/instruction streamprocessor 132 that receives an instruction stream shortly beforeexecution by CPU 12. Binary translation unit 134 examines incrementalsections of the instruction stream to decode and identify the occurrenceof privilege dependent instructions. Where found, the local instructionstream is further analyzed, and functionally modified to implement theintended instructions in a de-privileged execution manner. Preferably,such modifications are implemented by re-writing the instruction streamto implement the intended function without involving a privilegeexception. The instruction stream re-write can involve directsubstitution of an alternate series of instructions that directlyperform the desired function, insertion of appropriate jump instructionsto invoke one or more pre-established library call-out routines 136 toaccomplish the desired function, or a combination of both translationtechniques. The resulting translated instruction stream, furtherincorporating appropriate relative branch target modifications, is thenstored in translation cache 138. The original instruction stream is leftunmodified. Execution of the guest operating system (for example, one ofguest operating system 74 _(1-N)) is monitored with the effect thatwhenever the unmodified original instruction stream would otherwise befetched for execution, the translated instruction stream is fetched andexecuted instead.

VT processing component 128 preferably incorporates VM exit handler 140,VM entry handler 142, and supervisory virtualization processor 144. Thefunction and operation of VM exit handler 140 and VM entry handler 142are documented in, for example, the Intel® Virtualization Technology forDirected I/O Architecture Specification, Feb. 2006, Intel Corporation,Order Number D51397-001, Intel® Virtualization Technology Specificationfor the IA-32 Intel® Architecture, Apr. 2005, Intel Corporation, OrderNumber C97063-002, and Intel® Virtualization Technology Specificationfor the Intel® Itanium® Architecture (VT-I), Revision 2.0, Apr. 2005,Intel Corporation, Document Number 305942-002. In summary, VM exithandler 140 and VM entry handler 142 are responsible for managingvirtual machine control structure 114 (refer to FIG. 6) and for readingthe exit and programming the entry contexts of the virtual machine (forexample, one of virtual machines 72 _(1-N)) as appropriate to supportemulation of a particular privilege dependent instruction encountered.Supervisory virtualization processor 144 operates to identify both theprivilege dependent instruction that triggered a VM exit and therelevant details of the guest operating system (for example, one ofguest operating systems 74 _(1-N)) context under which execution of theinstruction was initiated. In preferred embodiments of the presentinvention, supervisory virtualization processor 144 preferablyimplements this analysis in a manner similar to binary translation unit134. That is, once the instruction and context are identified,supervisory virtualization processor 144 preferably determines and callslibrary routines similar to, if not the same as, the library call-outroutines 136 as appropriate to functionally implement the privilegedependent instruction.

Performance monitor 146 shown in FIG. 8, preferably represents aninstrumentation of the virtual machine monitor (for example, one ofvirtual machine monitors 78 _(1-N)) to collect, total and summarizeongoing performance of the virtual machine monitor in providingvirtualization support to its associated virtual machine. While thedetailed points of instrumentation will differ based on the specificimplementation of the virtual machine monitor, the instrumentationpreferably functions, relative to the first preferred embodiment of thepresent invention, to measure, over intervals, the time and resourcecosts incurred in, for example, retrieving program stream instructionsfor translation, the time used in performing translation and the sizeand relative use of the translation cache, and the relative increase inexecution time required in executing the translated instruction stream.The instrumentation also preferably considers the time cost ofperforming VM exit and entry transitions, which may be pre-calculated ordirectly measured, and the time and resources required by supervisoryvirtualization processor 144 to examine and emulate individual privilegedependent instructions. For the second preferred embodiment of thepresent invention, as will be described in greater detail below, theidentity, relative location, and frequency of the different privilegedependent instructions encountered are also collected. For allembodiments, the frequency that any portion of the instruction stream isrepeatedly encountered is also recognized and recorded by theperformance monitor 146.

Virtualization technique control component 148 interoperates withperformance monitor 146 to identify an optimal virtualization techniquefor the specific operating circumstances of the associated virtualmachine and, as necessary, correspondingly change the privilege modelimplemented by the virtual machine. For the first preferred embodimentof the present invention, the choice of optimal virtualization techniqueis reconsidered at intervals, whether defined by time, eventoccurrences, or possibly whenever a quantified measurement ofinstrumentation data has been collected. A switch between virtualizationtechniques is implemented upon recognition that the expected performancegain to be realized by switching will exceed a defined threshold value.This threshold value may be empirically determined to maximize overallperformance gain, and may be subject to adjustment by virtualizationtechnique control component 148.

For the first preferred embodiment of the present invention, the actualcomputation of the optimal virtualization technique is preferablydetermined from the relative difference in: (a) an actual,instrumentation determined, performance overhead incurred by thecurrently employed virtualization technique; and (b) an estimatedperformance overhead that would be incurred by other virtualizationtechniques in executing the same instruction stream over the sameinterval. The computation preferably also includes an estimatedperformance cost to switch between the current and estimatedvirtualization technique. Where a net improvement in performance isdetermined, preferably above the empirically determined threshold,virtualization technique control 148 switches the virtualizationtechnique implemented by the virtual machine monitor to thevirtualization technique determined to have the highest net performanceimprovement. Preferably, the instrumentation of virtual machine monitor78 also monitors the rate of change in the selected virtualizationtechnique as a control against overall performance loss due to excessiveor too fast switching of virtualization techniques.

For the second preferred embodiment of the present invention,virtualization technique control component 148 selects an optimalvirtualization technique based on identification of a current hotexecution path. FIG. 9 is a block diagram detailing operation ofperformance monitor 146 in accordance with one or more embodiments ofthe present invention. As shown in diagrammatic representation 150 ofFIG. 9, performance monitor 146 includes performance data store 152 thatcontinuously receives and stores instrumentation data collected from thevirtual machine monitor (for example, one of virtual machine monitors 78_(1-N)). At least for the second preferred embodiment of the presentinvention, performance monitor 146 also includes pattern analysis engine154 and pattern data store 156, which components are used by performancemonitor 146 to recognize, by temporally localized pattern, the start ofa current hot execution path. Preferably, a number of well-known orexpected patterns are pre-stored to pattern data store 156. Throughongoing operation of performance monitor 146 and pattern analysis engine154, principally based on the relative timing of occurrence and relativelocation, additional hot execution path patterns are dynamicallyrecognized and stored to pattern data store 156. That is, patternanalysis engine 154 preferably operates to recognize repeatedvirtualization operation occurrences due to specifically identifiedinstructions that are temporally local, based on the trapped instructionaddress determinable from the virtual machine context, and repeatedlyencountered in consistent order.

Virtualization technique control component 148 also interoperates withperformance monitor 146 of the second preferred embodiment to evaluatealternate virtualization techniques. The preferred virtualizationtechnique for a particular hot execution path is determined by summingperformance overheads for virtualization operations that will beperformed through the hot execution path, and selecting thevirtualization technique with the lowest path-dependent total overhead.For well-known hot execution paths, the performance computation may beperformed and stored to pattern data store 156 in advance of even theexecution of the virtual machine (for example, one of virtual machines72 _(1-N)). For newly discovered patterns and variants of well-knownpatterns, the computation is preferably performed once the pattern isidentified by pattern analysis engine 154. The pattern and the preferredvirtualization technique are then preferably stored to pattern datastore 156 for subsequent reference.

Virtualization technique choices for the hot execution paths arepreferably dynamically reevaluated and, as appropriate, changed. Variousconditions may result in changes in the relative costs of differentvirtualization techniques relative to specific hot execution paths.These conditions include changes in TLB and cache hit ratios, andchanges in instrumentation implemented by the virtual machine monitoragainst its corresponding guest operating system. On reevaluation of ahot execution path, chosen using for example a random samplingtechnique, the measured overhead cost can be averaged with the existingcost value stored in pattern data store 156. The choice ofvirtualization technique for the corresponding hot execution path maythen be changed dependent on the revised cost.

Diagrammatic representation 160 shown in FIGS. 10A, 10B and 10Cillustrates the application of multiple virtualization techniques, inparticular binary translation and VT virtualization techniques, tootherwise privilege dependent instruction sequences within aninstruction stream in accordance with a preferred embodiment of thepresent invention. For purposes of this example, VT virtualization ispreferably established as a default and initially current virtualizationtechnique. As shown in FIG. 10A, a portion of instruction stream 162 isshown in which a set of virtualization operations (A, B, C, D, E, F)occur, each set representing a location of a privilege dependentinstruction. As shown in FIG. 10A, each occurrence of virtualizationoperations is handled discretely by VT processing component 128. Thus,if instruction stream 162 is frequently encountered in the execution ofthe corresponding guest operating system (for example, one of guestoperating systems 74 _(1-N)), a substantial performance cost is incurredby frequent VM exit and VM entry transitions. Referring to FIG. 10B andconsidering the second preferred embodiment of the present invention,sufficient performance data is collected to support recognition of apattern starting with the virtualization operation (B). Thevirtualization operation at (A) may not be recognized as part of thepattern because the virtualization operation is too distant temporallyfrom following virtualization operations or may not reliably occur, soas not to be predictive of a pattern. Thus, the virtualization operationat (A) is preferably handled discretely as before by VT processingcomponent 128.

As shown in FIG. 10B, a virtualization operation at (B) is initiallytrapped by VT processing component 128. However, execution ofperformance monitor 146 and virtualization technique control 148(referring to FIG. 9) within the virtual machine monitor (for example,one of virtual machine monitors 78 _(1-N)) following entry in responseto the virtualization operation (B) VM exit transition (referring toFIG. 6) results in selection of a binary translation virtualizationtechnique for further processing of instruction stream 162, preferablyincluding the virtualization operation at (B). To do this, the privilegemodel is switched, and binary translation component 124 is invoked toprocess instruction stream 162 to functionally translate (B′) thevirtualization operations (B, C, D, E, F).

As shown in FIG. 10C, on subsequent executions of instruction stream162, binary translation (B′) of instruction stream 162 is nominallyavailable for execution immediately from translation cache 138(referring to FIG. 8). Recognition of the pattern initiated byvirtualization operation (B) preferably results in an immediatevirtualization switch to binary translation, and execution of thetranslated portion (B′) of instruction stream 162. Consequently, withthe pre-calculated preference for binary translation for the patternstarted by the virtualization operation at (B), only a minimumperformance cost of switching virtualization techniques is incurred tomaximize the potential execution performance of the given portion ofinstruction stream 162.

Referring again to FIG. 10B, several different considerations areinvolved in determining when and how to return from an elected binarytranslation virtualization technique to the default VT virtualizationtechnique. In recognizing a hot execution path pattern starting at (B),pattern analysis engine 154 (referring to FIG. 9) may also recognize adefinite pattern ending virtualization operation at (F). Thus, the endportion of the binary translated patch (B′) may simply incorporateinstructions necessary to switch to the default VT virtualizationtechnique. Alternately, as part of generating the binary translatedcode, binary translation unit 134 (referring to FIG. 8) will ensure thatan appropriate library call routine 136 (referring to FIG. 8) is calledfrom the generated code to cause a rate appropriate execution ofperformance monitor 146 and virtualization technique control component148 (referring to FIG. 9). When no further temporally localvirtualization operations are evident, virtualization technique controlcomponent 148 will preferably initiate a switch back to the default, VTvirtualization technique. Another alternative, or in addition, whenbinary translator component 124 recognizes the imminent execution of areturn from an interrupt (IRET) instruction, virtualization techniquecontrol component 148 will initiate a switch to a VT virtualizationtechnique, and enable the return through execution of a VM entrytransition.

FIG. 11 shows flow diagram 170 which illustrates a first preferredembodiment of the present invention for performing dynamic, blockoriented, selection and application of multiple virtualizationtechniques. For this embodiment, on any entry into the virtual machinemonitor (for example, one of virtual machine monitors 78 _(1-N)), atdecision step 172, performance monitor 146 will first determine whetherto reconsider use of the current virtualization technique. The electioncriterion upon which a reconsideration is evaluated can be simplywhether a sufficient interval of time has elapsed since the lastevaluation was performed. Another possible criterion is whether thequantitative amount of performance data collected since the lastevaluation is sufficient to warrant a reconsideration. Other criteriacan include the rate at which reconsiderations are requested relative toportions of time that the virtual machine spends in executing the guestoperating system and guest application programs (for example, one ofguest operating systems 74 _(1-N) and its corresponding guestapplication programs). Where the reconsideration criteria are not met,execution of the virtual machine monitor continues at step 174 asnecessary to support any outstanding virtual operation. On completion ofthe emulation, execution of the virtual machine monitor is exited.

Where the reconsideration criteria are met, control is transferred tostep 176 where performance monitor 146 and virtualization techniquecontrol component 148 interoperate to analyze the performance data 176,and at step 178, determine an optimal or preferred virtualizationtechnique. At step 180, virtualization technique control component 148then implements the chosen virtualization technique by, as necessary,adjusting the privilege model and enabling the appropriatevirtualization operation controls within the virtual machine monitor.Control is transferred to step 174 where the virtual machine monitorthen executes the appropriate support routines to implement thefunctional requirements of any outstanding virtual operation. Oncompletion of the emulation, execution of the virtual machine monitor isexited.

FIG. 12 shows flow diagram 190 which illustrates a second preferredembodiment of the present invention for performing dynamic, hot-pathoriented, selection and application of multiple virtualizationtechniques. For this embodiment, on each entry into the virtual machinemonitor (for example, one of virtual machine monitors 78 _(1-N)), atstep 192, a potential for switching virtualization techniques isconsidered relative to a program stream expected to be executed. Thevirtual machine context data for the guest operating system is retrievedfrom the virtual machine control structure, and control is transferredto decision step 194. At decision step 194, the information presented inthe virtual machine control structure is examined. In particular, theaddress location and instruction are identified and used by patternanalysis engine 154 to determine if the trap initiating instructionrepresents the start of a recognized hot execution path. If unrecognizedand the virtual address location is not temporally close to any priorrecorded performance data, control is transferred to step 196 where thevirtual machine monitor performs the appropriate emulation of thetrapped instruction, consistent with the currently active virtualizationtechnique. At decision step 194, where pattern analysis engine 154recognizes a hot execution path, control is transferred to step 198. Atstep 198, the corresponding preferred virtualization technique isapplied, and control is transferred to step 196 where emulation of thetrapped instruction is performed.

In accordance with one or more such embodiments of the presentinvention, the potential for sub-paths or nested hot execution paths ismonitored by recursively checking for the recognition of hot executionpaths as each privilege dependent instruction is encountered in theemulation operation of the virtual machine monitor at step 196. Asub-path, for purposes of one or more embodiments of the presentinvention, is defined otherwise as a hot execution path nested within acontinuing hot execution path where the nested path is optimallyperformed using a virtualization technique different from that of theimmediate outer hot execution path. A virtualization stack is preferablymaintained to track transitions between nested hot execution paths andthe stacked sequence of outer host execution paths. That is, at step198, as sub-paths are encountered and subsequently reach defined ends,an outer hot execution path virtualization technique identifier ispushed and popped from the virtualization stack to manage selection ofthe current implemented virtualization technique.

Finally, at decision step 194, where a hot execution path is notrecognized, but such a path may potentially exist based on existingperformance and pattern data, control is transferred to decision step200 where the current set of performance data is analyzed. If a hotexecution path pattern is not identified, control is transferred to step196 where the emulation of the trapped instruction is performed usingthe existing virtualization technique. Where a new pattern isdynamically identified, control is transferred to step 202 where theoptimal virtualization technique is computed, and both the pattern anddetermined optimal virtualization technique are stored as pattern datain pattern data store 156 (referring to FIG. 9) and control istransferred to step 198. At step 198, the newly identifiedvirtualization technique is applied, and control is transferred to step196. At step 196, emulation of the trapped instruction is performed. Oncompletion of the emulation, including any sub-paths, execution of thevirtual machine monitor is exited.

FIG. 13 shows flow diagram 209 which illustrates a preferred embodimentof a method for implementing dynamic transition between multiplevirtualization techniques in accordance with the present invention. Forone such preferred embodiment, binary translation and VT virtualizationtechniques are implemented in the virtual machine monitor (for example,one of virtual machine monitors 78 _(1-N)). At step 198 (also referringto FIG. 12), on determining to switch an active virtualization techniqueto a target virtualization technique, if a binary translation isselected control is transferred to step 210, otherwise, if a VTvirtualization technique is selected control is transferred to step 212.For binary translation, at step 214, VT processing component 128 isdisabled and binary translation component 124 is enabled (referring toFIG. 8). At step 216, the VMX privilege bit of the processor statusregister is reset, and the privilege bits maintained in the segmentregisters associated with the virtual machine monitor (for example, oneof virtual machine monitors 78 _(1-N)) and its corresponding guestoperating system (for example, one of guest operating systems 74 _(1-N))are modified to establish the standard binary translation ring-0, 1, 3privilege model 80 (referring to FIG. 4A) for execution of thecorresponding virtual machine (for example, one of virtual machine 72_(1-N)).

Where VT virtualization is to be activated, at step 218, operation ofbinary translation component 124 is suspended. In particular, thecontents of translation cache 138 and shadow page tables 106 aremaintained. Then, operation of VT processing component 128 is enabled.At step 220, the VMX privilege bit of the processor status register isset, and the privilege bits maintained in the segment registersassociated with the virtual machine monitor and its corresponding guestoperating system are modified to establish the standard VMX non-rootring -0, 3 privilege model 90 (referring to FIG. 4A) for execution ofthe corresponding virtual machine.

In switching between virtualization techniques, the current virtualmachine state for the chosen virtualization technique could bedetermined by review of the various on-CPU registers and in-memory datastructures of the respective guest operating systems 74 _(1-N).Preferably, virtualization technique control component 148 provides fora conversion between the virtual machine state representations used bythe different virtualization techniques. In particular, virtualizationtechnique control component 148 provides for conversion between thevarious in-memory data structures optimally used for binary translationvirtualization, and the hardware-dependent data structures required tosupport VT virtualization. Preferably, virtualization state descriptionsof the general and segment registers, interrupt state, shadowed portionsof the segment registers, control register and other aspects of the CPUstate are transferred. For a preferred embodiment of the presentinvention, the virtual machine state is maintained in the binarytranslation virtualization data structures and updated subject totransformation to the VT virtualization data structures as needed.

Thus, an autonomous system and methods of providing dynamic optimizingof the realized execution performance of virtual machines have beendescribed. While embodiments of the present invention have beendescribed particularly with reference to the Intel-based VTvirtualization technology, further embodiments of the present inventionare equally applicable to other hardware-based virtualizationtechnologies and to the use of and selection between multiple differentsoftware and hardware virtualization technologies within a virtualmachine monitor.

In view of the above description of the preferred embodiments of thepresent invention, many modifications and variations of the disclosedembodiments will be readily appreciated by those of skill in the art. Itis therefore to be understood that, within the scope of the appendedclaims, the invention may be practiced otherwise than as specificallydescribed above.

What is claimed is:
 1. An adaptive virtualization system providing forvirtualized execution of guest operating systems within virtual machineson a host computer system, said adaptive virtualization systemcomprising: a) a host platform, including a central processing unit andmemory, operable to execute instructions; b) a guest operating systemexecutable by said host platform as an instruction stream, saidinstruction stream including a plurality of defined portions; and c) avirtual machine monitor, executable by said host platform, includingfirst and second virtualization support processors, each operable toenable functional execution of privilege-dependent instructions, and avirtualization control unit operable to select between use of said firstand second virtualization support processors, said virtualizationcontrol unit dynamically selecting between said first and secondvirtualization support processors dependent on identifying apredetermined pattern of temporally local privilege-dependentinstructions within respective ones of said plurality of definedportions.
 2. The adaptive virtualization system of claim 1 wherein saidfirst and second virtualization support processors implement respectivevirtualization techniques for the execution of privilege-dependentinstructions.
 3. The adaptive virtualization system of claim 2 whereinsaid virtualization control unit includes a pattern store containing aplurality of patterns of temporally local privilege-dependentinstructions potentially identifiable with respect to said plurality ofdefined portions.
 4. The adaptive virtualization system of claim 3further comprising a performance monitor coupled to said virtualizationcontrol unit and said pattern store, said performance monitor operableto accumulate predetermined data reflective of the temporal locality ofprivilege-dependent instructions in the execution of said guestoperating system, said virtualization control unit being furtheroperable to analyze said predetermined data to recognize a uniquepattern of temporally local privilege-dependent instructions and tostore said unique pattern in said pattern store as one of said pluralityof patterns.
 5. The adaptive virtualization system of claim 4 whereinsaid unique pattern is recognized as a distributed plurality ofprivilege-dependent instructions encountered in the execution of saidinstruction stream in a fixed order.
 6. A computer system supportingpartitioning virtualization to manage execution of guest operatingsystems within virtual machines on a host computer system platform, saidadaptive computer system comprising: a) a processor; b) a memory coupledto the processor; c) a virtual machine executable by the processor andencapsulating a guest operating system, wherein virtualization-basedexecution of said guest operating system requires managed execution ofprivilege-dependent instructions; and d) a virtual machine monitorexecutable by the processor and implementing a virtualization controlunit, along with first and second virtualization subsystems so that eachprovides for managed execution of privilege-dependent instructions, saidvirtualization control unit being operative to recognize a pattern ofprivilege-dependent instructions characterized as mutually temporallylocal in a corresponding portion of an instruction stream, saidvirtualization control unit being operative to dynamically selectbetween use of said first and second virtualization subsystems dependenton identification of said pattern in said instruction stream.
 7. Thecomputer system of claim 6 further comprising a pattern data storeproviding for the storage of a plurality of predetermined patterns ofprivilege-dependent instructions, said virtualization control unit beingcoupled to said pattern data store to support comparison of said patternagainst said plurality of predetermined patterns.
 8. The computer systemof claim 7 wherein said virtualization control unit is operative tocompile predetermined data reflective of the temporal locality ofprivilege-dependent instructions in said instruction stream, saidvirtualization control unit being further operative to recognize andstore additional patterns of privilege-dependent instructions to saidpattern data store as part of said plurality of predetermined patternsof privilege-dependent instructions.
 9. The computer system of claim 8wherein said first virtualization subsystem implements a binarytranslation virtualization handler and said second virtualizationsubsystem implements a trap handler for hardware-based virtualizationexceptions.
 10. A method of optimizing the virtualization execution of aguest operating system on a host computer system, wherein execution ofpredetermined privilege-dependent instructions, encountered in theexecution of the guest operating system, are processed using a definedvirtualization technique implemented by a virtual machine monitor, saidmethod comprising the steps of: a) executing, by said host computersystem, an instruction stream implementing a guest operating systemsubject to a first virtualization technique implemented by said virtualmachine monitor; b) identifying a pattern of privilege dependentinstructions distributed within a defined portion of said instructionstream; and c) selecting, with respect to first and secondvirtualization techniques implemented by said virtual machine monitor, aone of said first and second virtualization techniques to implement inexecution, by said host computer system, of said defined portion of saidinstruction stream based on the identified pattern.
 11. The method ofclaim 10 wherein said first virtualization technique employshardware-based support for computer system partitioning virtualizationand said second virtualization technique employees binarytranslation-based virtualization.
 12. The method of claim 10 whereinsaid pattern of privilege dependent instructions is defined by aplurality of privilege-dependent instructions that occur in consistentexecution order and that are mutually temporally local.
 13. The methodof claim 12 further comprising the steps of: a) recording predetermineddata reflective of privilege-dependent instructions as encountered inthe execution of said instruction stream; b) analyzing saidpredetermined data to discover a set of patterns of privilege-dependentinstructions; and c) storing said set in a pattern store as part of aplurality of patterns of privilege-dependent instructions.
 14. Themethod of claim 13 wherein said step of identifying said patternincludes examining said defined portion with respect to said pluralityof patterns and wherein said step of selecting said one of said firstand second virtualization techniques is dependent on the identity ofsaid pattern.
 15. The method of claim 14 wherein said predetermined dataincludes the relative location of and execution order ofprivilege-dependent instructions.
 16. A method of enabling efficientvirtualization of a guest operating system executable within a virtualmachine on a host computer system with the support of a virtual machinemonitor, said method comprising the steps of: a) identifying, within aninstruction stream representing the execution of a guest operatingsystem, a hot execution path, wherein said hot execution path includes aplurality of temporally local privilege-dependent instructions within adefined portion of said instruction stream; and b) binary translatingsaid hot execution path to incorporate alterations to said definedportion to enable deprivileged execution of privilege-dependentinstructions within said defined portion consistent with thevirtualization execution of said guest operating system.
 17. The methodof claim 16 further comprising the steps of: a) executing saidinstruction stream subject to a first virtualization technique forhandling execution of privilege-dependent instructions occurring in saidinstruction stream; b) recognizing initial execution of said definedportion of said instruction stream; and c) switching execution of saidinstruction stream subject to a second virtualization techniqueconsistent with the binary translation of said defined portion.
 18. Themethod of claim 17 wherein said first virtualization technique employshardware-based support for computer system partitioning virtualization.19. The method of claim 18 wherein said step of executing includes thesteps of: a) collecting data representing the location and executionorder of Privilege-dependent instructions within said instructionstream; b) analyzing said data to identify a plurality of hot executionpath patterns; and c) storing said plurality of hot execution pathpatterns in a pattern store, wherein said pattern store is accessible insaid step of identifying to support identification of said hot executionpath from among said plurality of hot execution path patterns.
 20. Themethod of claim 19 further comprising a step of storing predefined hotexecution path patterns in said pattern store for use in supportingidentification of said hot execution path from among said plurality ofhot execution path patterns.