[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Questioning the Xen Design of the VMM


  • To: Al Boldi <a1426z@xxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: Keir Fraser <Keir.Fraser@xxxxxxxxxxxx>
  • Date: Tue, 08 Aug 2006 10:10:11 +0100
  • Delivery-date: Tue, 08 Aug 2006 02:10:37 -0700
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>
  • Thread-index: Aca6ynN3sgo3GSa9EduaRAAKle7CWA==
  • Thread-topic: [Xen-devel] Questioning the Xen Design of the VMM



On 7/8/06 4:01 pm, "Al Boldi" <a1426z@xxxxxxxxx> wrote:

> The Xen project caught my attention on LKML discussing hypervisors, so I took
> a look at Xen and read the README, where it says:
> 
> This install tree contains source for a Linux 2.6 guest
> 
> This immediately turned me off, as I hoped Xen would be a bit more
> transparent, by simply exposing native hw tunneled thru some multiplexed Xen
> patched host-kernel driver.
> 
> I maybe missing something, but why should the Xen-design require the guest to
> be patched?

You can run fully-virtualised guests on VT-x and AMDV hardware these days.

 -- Keir



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.