1 | <?xml version='1.0' encoding='UTF-8'?>
|
---|
2 | <!DOCTYPE topic PUBLIC "-//OASIS//DTD DITA Topic//EN" "topic.dtd">
|
---|
3 | <topic xml:lang="en-us" id="hwvirt">
|
---|
4 | <title>Hardware Virtualization</title>
|
---|
5 |
|
---|
6 | <body>
|
---|
7 | <p>
|
---|
8 | <ph conkeyref="vbox-conkeyref-phrases/product-name"/> enables software in the virtual machine to run
|
---|
9 | directly on the processor of the host, but an array of complex
|
---|
10 | techniques is employed to intercept operations that would
|
---|
11 | interfere with your host. Whenever the guest attempts to do
|
---|
12 | something that could be harmful to your computer and its data,
|
---|
13 | <ph conkeyref="vbox-conkeyref-phrases/product-name"/> steps in and takes action. In particular, for lots
|
---|
14 | of hardware that the guest believes to be accessing,
|
---|
15 | <ph conkeyref="vbox-conkeyref-phrases/product-name"/> simulates a certain <i>virtual</i>
|
---|
16 | environment according to how you have configured a virtual
|
---|
17 | machine. For example, when the guest attempts to access a hard
|
---|
18 | disk, <ph conkeyref="vbox-conkeyref-phrases/product-name"/> redirects these requests to whatever you have
|
---|
19 | configured to be the virtual machine's virtual hard disk. This is
|
---|
20 | normally an image file on your host.
|
---|
21 | </p>
|
---|
22 | <p>
|
---|
23 | Unfortunately, the x86 platform was never designed to be
|
---|
24 | virtualized. Detecting situations in which <ph conkeyref="vbox-conkeyref-phrases/product-name"/> needs to
|
---|
25 | take control over the guest code that is executing, as described
|
---|
26 | above, is difficult. To achieve this, <ph conkeyref="vbox-conkeyref-phrases/product-name"/> uses
|
---|
27 | <i>hardware virtualization</i>.
|
---|
28 | </p>
|
---|
29 | <p>
|
---|
30 | Intel and AMD processors have support for hardware virtualization.
|
---|
31 | This means that these processors can help <ph conkeyref="vbox-conkeyref-phrases/product-name"/> to
|
---|
32 | intercept potentially dangerous operations that a guest operating
|
---|
33 | system may be attempting and also makes it easier to present
|
---|
34 | virtual hardware to a virtual machine.
|
---|
35 | </p>
|
---|
36 | <p>
|
---|
37 | These hardware features differ between Intel and AMD processors.
|
---|
38 | Intel named its technology VT-x, AMD calls theirs AMD-V. The Intel
|
---|
39 | and AMD support for virtualization is very different in detail,
|
---|
40 | but not very different in principle.
|
---|
41 | </p>
|
---|
42 | <note>
|
---|
43 | <p>
|
---|
44 | On many systems, the hardware virtualization features first need
|
---|
45 | to be enabled in the BIOS before <ph conkeyref="vbox-conkeyref-phrases/product-name"/> can use them.
|
---|
46 | </p>
|
---|
47 | </note>
|
---|
48 | <p>
|
---|
49 | Enabling hardware virtualization is <i>required</i>
|
---|
50 | in the following scenarios:
|
---|
51 | </p>
|
---|
52 | <ul>
|
---|
53 | <li>
|
---|
54 | <p>
|
---|
55 | Certain rare guest operating systems like OS/2 make use of
|
---|
56 | very esoteric processor instructions. For virtual machines
|
---|
57 | that are configured to use such an operating system, hardware
|
---|
58 | virtualization is enabled automatically.
|
---|
59 | </p>
|
---|
60 | </li>
|
---|
61 | <li>
|
---|
62 | <p>
|
---|
63 | <ph conkeyref="vbox-conkeyref-phrases/product-name"/>'s 64-bit guest and multiprocessing (SMP)
|
---|
64 | support both require hardware virtualization to be enabled.
|
---|
65 | This is not much of a limitation since the vast majority of
|
---|
66 | 64-bit and multicore CPUs ship with hardware virtualization.
|
---|
67 | The exceptions to this rule are some legacy Intel and AMD
|
---|
68 | CPUs.
|
---|
69 | </p>
|
---|
70 | </li>
|
---|
71 | </ul>
|
---|
72 | <note type="caution">
|
---|
73 | <p>
|
---|
74 | Do not run other hypervisors, either open source or commercial
|
---|
75 | virtualization products, together with <ph conkeyref="vbox-conkeyref-phrases/product-name"/>. While
|
---|
76 | several hypervisors can normally be
|
---|
77 | <i>installed</i> in parallel, do not attempt to
|
---|
78 | <i>run</i> several virtual machines from competing
|
---|
79 | hypervisors at the same time. <ph conkeyref="vbox-conkeyref-phrases/product-name"/> cannot track what
|
---|
80 | another hypervisor is currently attempting to do on the same
|
---|
81 | host, and especially if several products attempt to use hardware
|
---|
82 | virtualization features such as VT-x, this can crash the entire
|
---|
83 | host.
|
---|
84 | </p>
|
---|
85 | </note>
|
---|
86 | <p>
|
---|
87 | See <xref href="hwvirt-details.dita#hwvirt-details"/> for a technical discussion of
|
---|
88 | hardware virtualization.
|
---|
89 | </p>
|
---|
90 | </body>
|
---|
91 |
|
---|
92 | </topic>
|
---|