On 17/02/2025 16:04, Fiona Ebner wrote:
> KSM exposes a guest's virtual memory to side-channel attacks. Add a VM
> configuration option to disable KSM for specific VMs that need to be
> protected against such attacks. This makes it possible to still
> benefit from KSM for other processes on the host rather than needing
> to turn of KSM completely.

As I had a KSM test setup available, I quickly tested this:

- created 4 VMs that, together, exceed 80% host RAM usage
- on one VM, set `allow-ksm=0` (tested via CLI and GUI)
- started VMs, monitored /proc/PID/ksm_stat
- only for the VM with `allow-ksm=0`, ksm_rmap_items/ksm_merging_pages
in ksm_stat stayed at 0. For all other VMs, both started to grow after a
couple of minutes.

So consider this:

Tested-by: Friedrich Weber <f.we...@proxmox.com>


_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to