KSM exposes a guest's virtual memory to side-channel attacks. Add a VM configuration option to disable KSM for specific VMs that need to be protected against such attacks. This makes it possible to still benefit from KSM for other processes on the host rather than needing to turn of KSM completely.
qemu-server: Fiona Ebner (1): close #5291: support disabling KSM for specific VMs PVE/QemuServer.pm | 9 +++++++++ 1 file changed, 9 insertions(+) manager: Fiona Ebner (1): close #5291: ui: qemu: memory edit: support disabling KSM for specific VMs www/manager6/qemu/HardwareView.js | 11 +++++++- www/manager6/qemu/MemoryEdit.js | 43 ++++++++++++++++++++++++++----- 2 files changed, 47 insertions(+), 7 deletions(-) docs: Fiona Ebner (1): kernel samepage merging: describe how to disable for a specific VM kernel-samepage-merging.adoc | 14 +++++++++++++- 1 file changed, 13 insertions(+), 1 deletion(-) Summary over all repositories: 4 files changed, 69 insertions(+), 8 deletions(-) -- Generated by git-murpp 0.5.0 _______________________________________________ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel