Thank You for Your time and answer, Boyd:

>VServer and OpenVZ requires the guests to know they are running in a 
>virtualized environment, since they share a kernel with the host.  They don't 
>support unmodified guest OSes.

In case of guest crack - will the attacker identify that he is in the virtual 
environment?

>The KVM kernel module does that, and more, through 
>the use of the VT extensions.

What do You think makes more overhead comparing KVM and Xen?


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to