KSM exposes a guest's virtual memory to side-channel attacks. Add a VM
configuration option to disable KSM for specific VMs that need to be
protected against such attacks. This makes it possible to still
benefit from KSM for other processes on the host rather than needing
to turn of KSM completely.

qemu-server:

Fiona Ebner (1):
  close #5291: support disabling KSM for specific VMs

 PVE/QemuServer.pm | 9 +++++++++
 1 file changed, 9 insertions(+)


manager:

Fiona Ebner (1):
  close #5291: ui: qemu: memory edit: support disabling KSM for specific
    VMs

 www/manager6/qemu/HardwareView.js | 11 +++++++-
 www/manager6/qemu/MemoryEdit.js   | 43 ++++++++++++++++++++++++++-----
 2 files changed, 47 insertions(+), 7 deletions(-)


docs:

Fiona Ebner (1):
  kernel samepage merging: describe how to disable for a specific VM

 kernel-samepage-merging.adoc | 14 +++++++++++++-
 1 file changed, 13 insertions(+), 1 deletion(-)


Summary over all repositories:
  4 files changed, 69 insertions(+), 8 deletions(-)

-- 
Generated by git-murpp 0.5.0


_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to