Coresight Pitfall Diary – Funnel Component

Coresight Pitfall Diary - Funnel Component

Introduction: The previous article was only half written and not published yet, so here’s a quick note. Preface Recently, while working with Coresight, I had a persistent question: how does the funnel know which trace source corresponds to the input slave port? After discussing with the FAE from the chip manufacturer today, I finally understood … Read more

Virtualization and Hard Isolation for Safety in Intelligent Cockpit Computing

Virtualization and Hard Isolation for Safety in Intelligent Cockpit Computing

Virtualization technology improves resource utilization and flexibility by allowing multiple virtual machines (VMs) to share underlying physical resources, but it also brings challenges in security and isolation. Hard isolation is a key mechanism to ensure that VMs do not interfere with each other, preventing malicious attacks or accidental failures from spreading from one VM to … Read more

Cloud Computing Virtualization: This Article is All You Need!

Cloud Computing Virtualization: This Article is All You Need!

Click the blue text to follow us First, let me clarify that this section and the following ones are the author’s insights from learning about Redhat’s network virtualization. Readers who are impatient can directly click: https://www.redhat.com/en/blog/introduction-virtio-networking-and-vhost-net https://www.redhat.com/en/blog/deep-dive-virtio-networking-and-vhost-net https://www.redhat.com/en/blog/hands-vhost-net-do-or-do-not-there-no-try The three elements of virtualization: For network cards, in a virtualized environment, one or more VMs run … Read more

Virtualization – Mastering OpenStack in 5 Minutes a Day (Part 2)

Virtualization - Mastering OpenStack in 5 Minutes a Day (Part 2)

Part 2 Virtualization OpenStack is a cloud operating system. To learn OpenStack, one must first grasp some knowledge related to virtualization and cloud computing. Virtualization Virtualization is the foundation of cloud computing. Simply put, virtualization allows multiple virtual machines to run on a single physical server, where the virtual machines share the physical machine’s CPU, … Read more

CPU Virtualization Series: VM Entry and Exit

CPU Virtualization Series: VM Entry and Exit

Wang Baisheng, Xie Guangjun Reading time: 8 minutes Quick read: 3 minutes This article is excerpted from the book “In-Depth Exploration of Linux System Virtualization: Principles and Implementation” written by Wang Baisheng and Xie Guangjun, focusing on how the virtual CPU switches between Host mode and Guest mode, and how KVM and the physical CPU … Read more

The Ideal Land Away from the Kernel: Hardware Virtualization

The Ideal Land Away from the Kernel: Hardware Virtualization

Introduction This story describes how to use Hardware Virtualization (HVM) to keep some of your hook code away from the kernel, making it less susceptible to interference from other kernel hooks and harder to detect. The idea for this article comes from a dynamic Linux kernel update project at a certain school, with much of … Read more

Research on Base Station Virtualization Technology

Research on Base Station Virtualization Technology

Authors Wang Youxiang, Li Yiqun, Li Fuchang, Feng Yi: China Unicom Network Technology Research Institute. Zhang Lan: China Xun Postal and Telecommunications Design Institute Co., Ltd. Abstract: Using a general hardware platform, virtualization technology achieves the decoupling of software and hardware, enabling the network to have flexible scalability, openness, and evolution capabilities. By virtualizing network … Read more

Performance Comparison of Virtualization Software

Performance Comparison of Virtualization Software

Produced by Kong Sang First published on WeChat account Kong Sang WeChat ID: OpenDataFoundation After tinkering with the home network, it’s almost time to timeout. Here’s a simple article. Test Results CPU The detailed entries come from the GPGPU testing section of AIDA64. Due to many peculiar issues in this section, and the big-little core … Read more

How to Solve Backup Time Issues with Large Virtualization Capacity?

How to Solve Backup Time Issues with Large Virtualization Capacity?

◉ How to Solve Backup Time Issues with Large Virtualization Capacity?Whether it is domestic or foreign virtualization, performing a full backup can result in a large capacity. Sometimes, based on requirements, off-site backups are also needed, which may require dedicated lines, not considering the cost issue for now. In reality, for example, when performing a … Read more

Exploring Vulnerabilities in the VMware Workstation Renderer

Exploring Vulnerabilities in the VMware Workstation Renderer

Background In mid-January, ZDI announced the rules for the 2017 competition, which included a substantial reward for teams that could break VMware and achieve virtual machine escape. VMware is no longer a new target; it was identified as a target in 2016. As a target, VMware has undergone various attacks, with many points of attack … Read more