CPU Virtualization Series: VM Entry and Exit

CPU Virtualization Series: VM Entry and Exit

Wang Baisheng, Xie Guangjun Reading time: 8 minutes Quick read: 3 minutes This article is excerpted from the book “In-Depth Exploration of Linux System Virtualization: Principles and Implementation” written by Wang Baisheng and Xie Guangjun, focusing on how the virtual CPU switches between Host mode and Guest mode, and how KVM and the physical CPU … Read more

The Ideal Land Away from the Kernel: Hardware Virtualization

The Ideal Land Away from the Kernel: Hardware Virtualization

Introduction This story describes how to use Hardware Virtualization (HVM) to keep some of your hook code away from the kernel, making it less susceptible to interference from other kernel hooks and harder to detect. The idea for this article comes from a dynamic Linux kernel update project at a certain school, with much of … Read more

Research on Base Station Virtualization Technology

Research on Base Station Virtualization Technology

Authors Wang Youxiang, Li Yiqun, Li Fuchang, Feng Yi: China Unicom Network Technology Research Institute. Zhang Lan: China Xun Postal and Telecommunications Design Institute Co., Ltd. Abstract: Using a general hardware platform, virtualization technology achieves the decoupling of software and hardware, enabling the network to have flexible scalability, openness, and evolution capabilities. By virtualizing network … Read more

Performance Comparison of Virtualization Software

Performance Comparison of Virtualization Software

Produced by Kong Sang First published on WeChat account Kong Sang WeChat ID: OpenDataFoundation After tinkering with the home network, it’s almost time to timeout. Here’s a simple article. Test Results CPU The detailed entries come from the GPGPU testing section of AIDA64. Due to many peculiar issues in this section, and the big-little core … Read more

How to Solve Backup Time Issues with Large Virtualization Capacity?

How to Solve Backup Time Issues with Large Virtualization Capacity?

◉ How to Solve Backup Time Issues with Large Virtualization Capacity?Whether it is domestic or foreign virtualization, performing a full backup can result in a large capacity. Sometimes, based on requirements, off-site backups are also needed, which may require dedicated lines, not considering the cost issue for now. In reality, for example, when performing a … Read more

Exploring Vulnerabilities in the VMware Workstation Renderer

Exploring Vulnerabilities in the VMware Workstation Renderer

Background In mid-January, ZDI announced the rules for the 2017 competition, which included a substantial reward for teams that could break VMware and achieve virtual machine escape. VMware is no longer a new target; it was identified as a target in 2016. As a target, VMware has undergone various attacks, with many points of attack … Read more

Comparing Virtualization and Containerization in DevOps

Comparing Virtualization and Containerization in DevOps

Both virtualization and containerization are common technologies in the DevOps field, enabling resource isolation, but they differ significantly in principles and application scenarios. Today, we will compare them to see how to choose the right one in practical work. Virtualization: The Heavyweight “Fortress” Virtualization divides a physical machine into multiple virtual machines (VMs) through a … Read more

ARMv8/v9-GIC Virtual Interrupt Direct Injection System Architecture

ARMv8/v9-GIC Virtual Interrupt Direct Injection System Architecture

ver0.2 Introduction In the previous article, we introduced the basic architecture and routing mechanism of LPI-type interrupts. I believe everyone is now somewhat familiar with LPI-type interrupts, at least understanding the difference between bus-based (Message) and hardwired (Signal) interrupt types. We also discussed the basic architecture and working principles of GIC physical interrupt virtualization. However, … Read more

System Practice Learning ARMv8 Assembly – Course 4

System Practice Learning ARMv8 Assembly - Course 4

Course 4: Detailed Explanation and Practical Application of ARMv8 Assembly Pseudo Instructions Pseudo instructions (Directives) are auxiliary instructions provided by the assembler to control code generation, data allocation, segment structure, etc.,which do not directly translate into machine code. Below is a classification and example analysis of commonly used pseudo instructions in ARMv8 assembly: 1. Segment … Read more

Deep Dive into ARM Embedded Systems | ARMV8 Linker Script u-boot.lds Source Code Analysis

Deep Dive into ARM Embedded Systems | ARMV8 Linker Script u-boot.lds Source Code Analysis

u-boot.lds is the linker script file for the u-boot project, which plays a crucial role in the compilation and linking of the project. It determines the assembly of u-boot and instructs the linker on how to combine the sections from various source files (such as assembly and C source files) into the final executable file. … Read more