Zhao Forrest wrote:
>>> Normally swapping mechanism choose the Least Recently Used(LRU) pages
>>> of a process to be swapped out. When KVM uses MMU notifier in linux
>>> kernel to implement swapping for VM, could KVM choose LRU pages of a
>>> VM to swap out? If so, could you give a brief descriptio
> >
> > Normally swapping mechanism choose the Least Recently Used(LRU) pages
> > of a process to be swapped out. When KVM uses MMU notifier in linux
> > kernel to implement swapping for VM, could KVM choose LRU pages of a
> > VM to swap out? If so, could you give a brief description about how
> >
Zhao Forrest wrote:
> when NPT is used by KVM in the future, this mmu
>
btw, NPT support is already integrated.
--
Do not meddle in the internals of kernels, for they are subtle and quick to
panic.
-
This SF.net email
> > Normally swapping mechanism choose the Least Recently Used(LRU) pages
> > of a process to be swapped out. When KVM uses MMU notifier in linux
> > kernel to implement swapping for VM, could KVM choose LRU pages of a
> > VM to swap out? If so, could you give a brief description about how
> > this
Zhao Forrest wrote:
>>> Normally swapping mechanism choose the Least Recently Used(LRU) pages
>>> of a process to be swapped out. When KVM uses MMU notifier in linux
>>> kernel to implement swapping for VM, could KVM choose LRU pages of a
>>> VM to swap out? If so, could you give a brief descriptio
Zhao Forrest wrote:
>> - swapping allows you to overcommit memory
>>
>
> Normally swapping mechanism choose the Least Recently Used(LRU) pages
> of a process to be swapped out. When KVM uses MMU notifier in linux
> kernel to implement swapping for VM, could KVM choose LRU pages of a
> VM to sw
> >
> > could you (or anybody) elaborate on that? the mmu-related threads show
> > lots of progress, but it's way (way) out of my league.
> >
> > AFAICT, it's about the infrastructure to later write drivers (virtio?)
> > to DMA-heavy hardware (IB, RDMA, etc). am i wrong? or is it
> > something more
Javier Guerra wrote:
> On 3/4/08, Avi Kivity <[EMAIL PROTECTED]> wrote:
>
>> apply to kvm guests. With mmu notifiers, the trend will grow even stronger.
>>
>
> could you (or anybody) elaborate on that? the mmu-related threads show
> lots of progress, but it's way (way) out of my league.
>
On 3/4/08, Avi Kivity <[EMAIL PROTECTED]> wrote:
> apply to kvm guests. With mmu notifiers, the trend will grow even stronger.
could you (or anybody) elaborate on that? the mmu-related threads show
lots of progress, but it's way (way) out of my league.
AFAICT, it's about the infrastructure to l
Zhao Forrest wrote:
>> The incoming packet is processed by the host ethernet stack; it is
>> forwarded to the bridge, which forwards it to the tap. When the tap
>> queues the packet, it sends a signal to qemu (since the tap file
>> descriptor has a signal associated). When the kernel delivers the
Thanks for your detailed explanation :). That's quite helpful for me
to understand KVM internals.
>
> > If this is the case, see the below example:
> > 1 physical NIC interrupt is received on physical CPU 0 and host kernel
> > determines that this is a network packet targeted to the emulated NIC
>
Zhao Forrest wrote:
>> http://ols.108.redhat.com/2007/Reprints/kivity-Reprint.pdf
>>
>>
> Hi Avi,
>
> I have a question about KVM architecture after reading your paper.
> It reads:
> ..
> At the kernel level, the kernel causes the hardware
> to enter guest mode. If the processor exits gues
>
> http://ols.108.redhat.com/2007/Reprints/kivity-Reprint.pdf
>
Hi Avi,
I have a question about KVM architecture after reading your paper.
It reads:
..
At the kernel level, the kernel causes the hardware
to enter guest mode. If the processor exits guest
mode due to an event such as an externa
Alessandro Sardo wrote:
> Hello,
>
> I'm interested in learning the technical details of KVM, possibly up to
> date with latest versions (KVM changes so fast!). I'm not really geared
> to development (yet), rather I would like to study its architecture from
> a security point of view.
>
> I've s
Hello,
I'm interested in learning the technical details of KVM, possibly up to
date with latest versions (KVM changes so fast!). I'm not really geared
to development (yet), rather I would like to study its architecture from
a security point of view.
I've searched anywhere and all I could find
15 matches
Mail list logo