Loading…
KVM Forum 2019 has ended
October 31 - November 1
Lyon Convention Centre - Lyon, France
More information for KVM Forum 2019
KVM Forum Track 2 [clear filter]
Thursday, October 31
 

11:00 CET

Managing Matryoshkas: Testing Nested Guests - Marc Hartmayer, IBM
The nested virtualization functionality is one of the key functionalities of modern hypervisors. Yet, one central quest is to find an adequate way to write functional tests that check and verify the entire "KVM/QEMU/libvirt" stack in each level of (nested) guest. How can each guest level be supervised, managed, tested without introducing high complexity and without writing duplicated code in each guest level?

In this presentation, Marc Hartmayer will discuss existing test approaches and present an alternative approach by using "self-replicating programs" in combination with the technique of remote proxy objects. Moreover, he will show a demo for a test case in which the pass-through functionality of a device will be tested up to the Nth level. Lastly, he'll give an outlook on how this approach could be integrated into existing frameworks like Avocado and what else could be done.

Speakers
MH

Marc Hartmayer

Software Engineer - Linux on Z & Virtualization Development, IBM Deutschland Research & Development GmbH
Employer: IBM Working on: libvirt, s390-tools and QEMU


slides pdf

Thursday October 31, 2019 11:00 - 11:30 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

11:30 CET

Nesting&testing - Vitaly Kuznetsov, Red Hat
Nested virtualization on x86 is finally becoming a thing: lots of work has been
done recently to eliminate bugs and make it faster. Testing, however, remains
a challenge and regressions even for KVM-on-KVM are, unfortunately, not
uncommon. Adding third party hypervisors (Hyper-V, VMware,...) and different
types of L2 guests to the picture also doesn't make it any simpler.

The talk will try to cover the existing KVM testing frameworks: kvm-unit-tests
and selftests, what these frameworks test and what they don't, the gaps we have
between VMX and SVM. Possible improvements and additional testing approaches
will be suggested. Overall, this is going to be an open discussion on how we
can test nested virtualization better.

Speakers
avatar for Vitaly Kuznetsov

Vitaly Kuznetsov

Principal Software Engineer, Red Hat
Software Engineer



Thursday October 31, 2019 11:30 - 12:00 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

12:00 CET

Moving s390 Kvm-unit-tests up the Stack - Janosch Frank, IBM R&D Germany
Tests from the KVM unit tests framework have been traditionally run on only one hypervisor...KVM. But having a clean and tiny test framework has been so invaluable, we started porting it to all s390 hypervisors that are out there.

This allowed new users like hardware and firmware to use it and with the advent of Protected Virtualization became an important part of software and hardware verification.

This talk concentrates on how we used KVM unit tests in the past, how we're using it right now and what lies in the future for s390 (and maybe also other platforms).

Cross and stacked hypervisor testing to the rescue!




Speakers
JF

Janosch Frank

Software Engineer, IBM
Janosch is a software engineer at IBM Germany and a s390 co-maintainer for KVM. He works on guest memory management, Protected Virtualization and KVM testing.



Thursday October 31, 2019 12:00 - 12:30 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

13:45 CET

virtio-fs: A Shared File System for Virtual Machines - Stefan Hajnoczi, Red Hat
virtio-fs is a new shared file system for virtual machines. Unlike previous approaches, it is designed to take advantage of the co-location of virtual machines and the hypervisor to achieve local file system semantics and performance. This talk covers the status of virtio-fs, its key features, and use cases.

Amongst its features, the ability to share the host page cache with the guest is unique and not available in other shared file systems. This leads to interesting applications, including local file system mmap MAP_SHARED semantics, memory footprint reduction, and efficient page cache sharing between guests.

This talk also covers metadata coherence and the shared memory version table that is being developed to achieve this. The table allows guests accessing the same files and directories to have a consistent view even when other guests make changes to the file system.

Speakers
avatar for Stefan Hajnoczi

Stefan Hajnoczi

Senior Principal Software Engineer, Red Hat
Stefan works on QEMU and Linux in Red Hat's Virtualization team with a focus on storage, VIRTIO, and tracing. Recent projects include libblkio, virtiofs, storage performance optimization for NVMe drives, and out-of-process device emulation. Stefan has been active in the QEMU community... Read More →



Thursday October 31, 2019 13:45 - 14:15 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

14:15 CET

SPDK Vhost FUSE Target to Accelerate File Access in VMs and Containers - Changpeng Liu & Xiaodong Liu, Intel
Virtio-fs(https://virtio-fs.gitlab.io/) is proposed recently to provide file system sharing for lightweight VMs and containers workloads, where shared volumes are a requirement.

In this presentation, we propose an SPDK(Storage Performance Development Kit, https://spdk.io) userspace vhost-user-fs solution, which can be used together with QEMU/Kata Container to accelerate virtio-fs. Virtio-fs uses FUSE instead of 9P for communication. We will present this solution in details including the utilization of techniques such as virtio-fs, blobfs (SPDK file system) and the significant performance gain achieved. Blobfs can be built on abstract block device layer in SPDK, which can access local or remote storage services via iSCSI/NVMe/NVMeoF protocols in userspace. Relying on this solution, we are going to build a fast, consistent and secure manner to share directory tree on host to guests.

Speakers
avatar for Xiaodong Liu

Xiaodong Liu

Senior Cloud Engineer, Intel
Xiaodong is a senior cloud software engineer at Intel. He works on the areas of cloud native storage, storage acceleration, storage protocols and storage virtualization, mainly contributing to Storage Performance Development Kit (SPDK) and Intel Intelligent acceleration Library (ISA-L... Read More →



Thursday October 31, 2019 14:15 - 14:45 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

14:45 CET

virtio-vsock in QEMU, Firecracker and Linux: Status, Performance and Challenges - Andra Paraschiv, Amazon Web Services & Stefano Garzarella, Red Hat
The virtio-vsock device provides a zero-configuration communication
channel between guest agents and hypervisor services independent of the
guest network configuration. QEMU and the Linux kernel have virtio-vsock
vhost support. Firecracker is a new open source Virtual Machine Monitor
(VMM) that makes use of KVM and includes support for virtio-vsock.

Andra will give an intro on the state of the art of virtio-vsock and its
use cases. She will then present multiple proposed options for
communication channels between a virtual machine and the host or between
virtual machines using Firecracker. These options include the vhost
backend as well as UNIX domain sockets. She will share performance
metrics with regard to the discussed alternatives.

Stefano will describe the latest performance improvements within the
Linux kernel and QEMU. He will also give an overview of tools that
recently added vsock support (e.g. wireshark, tcpdump, iproute2-ss,
ncat). Finally, he will present the next challenges that will be faced
to improve virtio-vsock, such as support for nested VMs and network
namespaces.

Speakers
avatar for Stefano Garzarella

Stefano Garzarella

Principal Software Engineer, Red Hat
Stefano is a Principal Software Engineer at Red Hat.He is working on virtualization and networking topics in QEMU and Linux kernel. He is the maintainer of Linux's vsock subsystem (AF_VSOCK).Current projects cover vDPA for virtio-blk devices, virtio-vsock, QEMU network and storage... Read More →
avatar for Andra Paraschiv

Andra Paraschiv

Software Engineer, Individual Contributor
Andra is a Software Development Engineer at Amazon Development Center, Romania, Bucharest, part of Amazon Web Services (AWS). She has been working on the virtualization stack of EC2, both on Xen and Nitro hypervisors. Before AWS, she was a Software Engineer at Intel, focusing on research... Read More →



Thursday October 31, 2019 14:45 - 15:15 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

15:45 CET

Virtualized Fibre-channel - Some Years Later - Hannes Reinecke, SUSE Linux GmbH
During the KVMForum in Prague Paolo and me have presented the challenges in implementing virtualized fibrechannel for qemu. However, after some initial submission the entire topic didn't receive much traction.
So here I will be presenting a way on how to efficiently map fibrechannel devices onto virtio-scsi by just updating the mapping information and not modifying the actual data layout.
Thus I've preserved backwards compability with existing implementations and allowed new installations to take advantage of the new implementation.

Speakers
HR

Hannes Reinecke

Storage Architect, SUSE Linux
Studied Physics with main focus image processing in Heidelberg from 1990 until 1997, followed by a PhD in Edinburgh 's Heriot-Watt University in 2000. Worked as sysadmin during the studies, mainly in the Mathematical Institute in Heidelberg. Now working at SUSE Labs as Kernel Storage... Read More →


Thursday October 31, 2019 15:45 - 16:15 CET
Forum 3

16:15 CET

Reworking the Inter-VM Shared Memory Device - Jan Kiszka, Siemens AG
The ivshmem device is a simple way to interconnect a number of VMs and let them exchange data and events without much hypervisor involvement. In fact, this is a common pattern in many hypervisor, specifically in embedded. But our current design has a number of shortcomings, primarily around life-cycle management. And it has always been a stepchild, lacking even an upstream kernel driver.

This talk will present our effort to improve ivshmem. The new design gained essential missing features as well as a number of nice add-ons like uni-directional memory regions or optimized UIO interrupt handling. And it has been written to be applicable on QEMU as well as other hypervisors, e.g. Jailhouse.

The talk will furthermore present a prototype that stacks virtio over an ivshmem link, providing a lightweight backend-frontend channel that does not require virtio awareness in the hypervisor.

Speakers
avatar for Jan Kiszka

Jan Kiszka

Principal Key Expert, Siemens
Jan Kiszka is working as consultant, open source evangelist and Principal Key Expert Engineer in the Linux Expert Center at Siemens Technology. He is supporting Siemens businesses with adapting, enhancing or strategically driving open source as platform for their product demands... Read More →



Thursday October 31, 2019 16:15 - 16:45 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

16:45 CET

Making the Most of NBD - Eric Blake & Richard Jones, Red Hat
The Network Block Device (NBD) protocol dates back to Linux 2.1.55 in April 1997, pre-dating iSCSI as a means for block device access of remote storage. However, in more recent years, the protocol has seen a revival as virtualization scenarios have used and extended its features for a variety of tasks.

This talk will cover recent developments: new commands (WRITE_ZEROES, BLOCK_STATUS, RESIZE), encryption support (X.509 certificates, TLS PSK), multi-connection throughput enhancement, underlying protocol improvements (structured replies, 64-bit requests), and standardization efforts for a common URI naming representation.

Richard Jones and Eric Blake will also discuss performance improvements, and userspace libraries for easier integration of the NBD protocol into other projects (nbdkit, libnbd). A demonstration of some interesting nbdkit plugins and filters will tie it all together.

Speakers
RW

Richard W.M. Jones

Senior Principal Software Engineer, Red Hat
Richard Jones works at Red Hat. He works on virtualization, importing VMs from other hypervisors to KVM, RISC-V, Fedora, and Unikernels.
avatar for Eric Blake

Eric Blake

Software Engineer, Red Hat
Eric Blake is a software engineer at Red Hat, working on block device management in virtualization. He has contributed extensively to qemu and libvirt. He has spoken at several past KVM Forums, most recently about making the most of NBD in Oct 2019.



Thursday October 31, 2019 16:45 - 17:15 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES
 
Friday, November 1
 

09:00 CET

What's Going On? Taking Advantage of TCG's Total System Awareness - Alex Bennée, Linaro
When emulating a system using QEMU's Tiny Code Generator we must inspect and translate every single instruction that gets executed. As we completely control the system we should be able to extract some interesting information about how the code executes. While other code instrumentation systems exist (DynamoRIO, Pin, Valgrind) QEMU is unique in supporting system emulation as well as not requiring the host system to have the same instruction set as the guest. In this talk we shall discuss how we can answer some interesting questions about programs running under QEMU. We shall examine some of the drawbacks of QEMU's current introspection support. Finally we shall discuss if a plugin system will allow for more detailed experiments without comprising our ability to continually improve the quality of our emulation code.

Speakers
avatar for Alex Bennée

Alex Bennée

Virtualisation Tech Lead, Linaro
Alex started learning to program in the 80s in an era of classic home computers that allowed you to get down and dirty at the system level. After graduating with a degree in Chemistry he's worked on a variety of projects including Fruit Machines, Line Cards, CCTV recorders and point-to-multipoint... Read More →



Friday November 1, 2019 09:00 - 09:30 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

09:30 CET

Towards the Higher Level Debugging with QEMU - Pavel Dovgalyuk, ISP RAS
QEMU includes gdbserver emulator which is capable of debugging the whole emulated system, including firmwares, drivers, and BIOS code. However, debugging with a multi-process operating system is tricky, because GDB does not distinguish the processes within the guest.
In this talk authors discuss the approaches for making the debugging better: detecting the processes, inspection of the address spaces, instrumenting the code, mapping the executables, and so on.

The talk also includes overview of the new debugging stub for QEMU which allows using WinDbg without switching the guest system into the debugging mode.

Speakers
PD

Pavel Dovgalyuk

Software developer, ISP RAS
Pavel Dovgalyuk is a software developer in Institute for System Programming (ISP) of the Russian Academy of Sciences (RAS). The activities of the Institute include fundamental research, software development, applied research for the benefits of the Industry, and education. For the... Read More →



Friday November 1, 2019 09:30 - 10:00 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

10:00 CET

QEMU-Hexagon: Automatic Translation of the ISA Manual Pseudcode to Tiny Code Instructions of a VLIW Architecture - Niccolò Izzo, rev.ng & Taylor Simpson, Qualcomm Innovation Center
This talk will present the implementation of the QEMU frontend for the Qualcomm Hexagon DSP.

The QEMU frontend is automatically generated: the authors have extracted and formalized the pseudocode of each instruction from the ISA reference manual and implemented a translator.
This translator transforms the pseudocode to C code to be embedded directly in QEMU which performs instruction decoding, textual disassembly and generates the equivalent tiny code instructions.
This approach reduces the implementation effort and allows to easily add new instructions.

The other interesting aspect is the fact that Hexagon is a VLIW architecture: it runs bundles composed of up to 4 parallel instructions that might also feature data dependencies.

This talk also wants to be the starting point for upstreaming our frontend, which is now almost feature-complete.

Speakers
avatar for Taylor Simpson

Taylor Simpson

Lead LLVM Compiler & Tools Team, Qualcomm Innovation Center
Taylor Simpson (PhD) leads the LLVM compiler and tools team at Qualcomm Innovation Center.  His team is dedicated to delivering state-of-the-art toolchains for all Qualcomm processors, including Hexagon.  He presented a talk on the LLVM back end for Hexagon at the 2011 LLVM Developers... Read More →
NI

Niccolò Izzo

Lead Compiler Engineer, rev.ng
N. Izzo received its Master’s Degree in Computer Science and Engineering (cum laude) in 2017 from Politecnico di Milano (Italy), his thesis work was published as “Software-only Reverse Engineering of Physical (DRAM) Mappings for Rowhammer Attacks” (Costa Brava, Spain, IEEE... Read More →



Friday November 1, 2019 10:00 - 10:30 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

11:00 CET

Hybird^2 Nested VM IO Performance Tuning - Tianyu Lan, Microsoft & Chao Peng, Intel
As popular of cloud, more vendors move their business into cloud and nested virtualization technology is used in the production environment more and more(e.g security container and emulation ). Microsoft Azure cloud platform provides nested virtualization support.

The IO performance is still to be a bottleneck for good experience with high through put. This is due to long code path and several data copies among host, L1 VM and L2 VM. Traditional solution is to use pass-through solution and expose virtual IOMMU to L1 VM. But Virtual IOMMU still has a side affect. This topic is to propose a hybrid solution of vhost-user with user space drivers (DPDK, SPDK)plus device pass through(L0->L1) to accelerate nested VM IO performance. From test result, L2 VM can achieve almost 100% L0 IO performance in some cases. This topic will show our performance result and some challenges.

Speakers
CP

Chao Peng

Senior Software Engineer, Intel
Chao Peng is a senior software engineer in Intel virtualization team. His responsibilities include enabling various hardware virtualization features in open source VMM/OS, as well as developing new usages models in virtualization and cloud environment. He was speaker in KVM forum/Xen... Read More →
TL

Tianyu Lan

Senior Software Engineer, Microsoft
Tianyu is Senior Software Engineer in COSINE(Core OS & Intelligent Edge) at Microsoft. He focuses on the performance optimization of Linux VMs on Hyper-V. Previously, Tianyu worked on ACPI, power management, KVM and Xen opens source projects at Intel Open source technology center... Read More →


Friday November 1, 2019 11:00 - 11:30 CET
Forum 3

11:30 CET

Ideal/optimal Memory Management for Future VMs - Isaku Yamahata, Intel
We argue that memory management for future VMs ought to be different from the one for Linux processes. Recently new types of memory, such as persistent memory, encrypted memory, are emerging, and they have different characteristics or require different (or additional) operations (e.g. flush caches) in terms of memory management. Although KVM has started to reuse the Linux kernel mechanism and benefited, it’s becoming difficult to keep using the kernel memory management for guests to meet those requirements, while achieving performance and simplicity. For example, various aspects of memory management are different: life cycles, page sizes, page invalidation, page access/modification tracking, memory ballooning, security, and isolation (e.g. from the host). In this session we discuss ideal/optimal memory management for guest VMs, possible implementation options, and preliminary PoC.

Speakers
avatar for Isaku Yamahata

Isaku Yamahata

Software engineer, Intel
Isaku Yamahata is a Software architect in the Open Source Technology Center, Intel. His main focus is virtualization technology, network virtualization as Software Defined Networking for multiple years. Isaku is an active on Graphene LibOS and OpenStack Neutron (networking) and has... Read More →



Friday November 1, 2019 11:30 - 12:00 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

12:00 CET

A Lightweight Virtual Interrupt Controller for Container/Serverless - Jing Liu & Chao Peng, Intel
On x86 platforms, interrupts are configured and delivered to operating system through either the interrupt controllers(e.g. PIC/APIC) or MSI/MSI-X. Similarly for virtualized x86 system, the same set of technologies are used. However, this is not fundamentally required and for some light weight virtualization usages like Kata Containers and Firecracker, which mainly focus on virtio devices and even MSI/MSI-X is not included due to complexity of PCI, the existing interrupt controllers and interrupt handling flow in both host and guest sides are over-killed. We prototyped a new virtual and simplified interrupt controller which fits current kernel interrupt framework well and meanwhile keeps only minimal code in VMM side. This will present the solution as well as the performance data and demonstrate how it can achieve simple and efficient interrupt handling for virtio-mmio device.

Speakers
JL

Jing Liu

Software Engineer, Intel
Jing Liu is a software engineer working in Intel virtualization team. She focuses on hardware virtualization enabling work and innovation optimization projects for modern cloud in these years. She was once a speaker for colleges in previous company IBM.
CP

Chao Peng

Senior Software Engineer, Intel
Chao Peng is a senior software engineer in Intel virtualization team. His responsibilities include enabling various hardware virtualization features in open source VMM/OS, as well as developing new usages models in virtualization and cloud environment. He was speaker in KVM forum/Xen... Read More →



Friday November 1, 2019 12:00 - 12:30 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

13:45 CET

KubeVirt Community Update - Fabian Deutsch, Red Hat
KubeVirt enables Kubernetes to run VMs in addition to containers and got introduced 2 years ago. In these 2 years quite a lot has changed and KubeVirt gained traction. In this talk we are

- giving small demo to illustrate how KubeVirt works
- looking at where KubeVirt stands today
- what features it gained
- what architectural shifts it went through
- how traditional components like libvirt are used
- how the community is using KubeVirt
- and what is laying ahead

Speakers
avatar for Fabian Deutsch

Fabian Deutsch

KubeVirt Maintainer + Engineering Manager, Red Hat
Fabian Deutsch has been working in open source for quite a while, Initially gaining experience in the Linux plumbing layer, and image building, he later focused on the virtualization stack, and recently joined the container track.



Friday November 1, 2019 13:45 - 14:15 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

14:15 CET

Post-copy Live Migration on Pass-through Devices - Kevin Tian & Shaopeng He, Intel
As we all know, post-copy can greatly reduce live migration down time for devices with memory intensive usages. While it is possible on emulated devices, live migration with post-copy technology on pass-through devices is still not supported. In this session, Yan will explain detailed benefits and show you a generic solution in VFIO on how to migrate pass-through devices with post-copy technology and Shaopeng will expose performance statistics of using post-copy on migrating SRIOV VFs on Intel NIC.

Speakers
KT

Kevin Tian

Principal Engineer, Intel
Kevin is a virtualization veteran from Intel with 16 years experience in open source virtualization projects (KVM, Xen, etc.), including multiple presentations in associated conferences. He is currently a software architect in Open source Technology Center of Intel, with current focus... Read More →
SH

Shaopeng He

Senior Network Software Engineer, Intel
Shaopeng is a Senior Network Software Engineer from Intel. He focuses on Network Interface Controller and I/O virtualization. Prior to Intel, he worked in cloud and network industry for over 10 years.



Friday November 1, 2019 14:15 - 14:45 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

14:45 CET

Efficient Performance Monitoring in the Cloud with Virtual PMUs - Sean Christopherson, Intel
Virtual Performance Monitor Units (vPMUs) are usually disabled in today’s KVM-based clouds though some runnable vPMU code has been in the upstream for several years. Consequently, profiling software inside virtual machines becomes a gap in the services that cloud vendors can provide. The main barriers are 1) the existing vPMU provides inaccurate profiling results in some cases; and 2) the advanced vPMU features, e.g. LBR and PEBS, have not been supported as they are not designed with virtualization in consideration.

To tackle the above issues, the existing vPMU is optimized by avoiding some heavyweight host perf operations. Tests show that the optimization can greatly reduce the emulation overhead of guest PMU operations with ~3000x boost, and achieves near-native efficiency. In addition, for the first time the virtualized LBR and PEBS features are brought to the clouds.

Speakers
avatar for Sean Christopherson

Sean Christopherson

Software Engineer, Google
Sean is an engineer at Google Cloud focused on KVM, and is an upstream co-maintainer for x86 KVM.



Friday November 1, 2019 14:45 - 15:15 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

16:15 CET

Multi-process QEMU - Status Update - John Johnson & Elena Ufimtseva, Oracle
QEMU can be susceptible to security attacks on the many interfaces it exposes to a guest VM. Each interface is an exposure point that, if compromised, provides a malign guest the ability to assume the QEMU process's host privileges.

A multi-process QEMU involves separating QEMU services into multiple host processes. Each of these processes can be given only the privileges it needs to provide its service.

We introduced this topic at KVM forum two years ago, and hosted a BoF on it last year. In this presentation, we will introduce the work we've done with an LSI SCSI controller model, including how it performs, and what the next steps will be.

Speakers
JJ

John Johnson

Software Architect, Oracle
I've been working on virtualization technologies for a number of years, beginning with the LDOMs product at Sun Microsystems. Recently, I've been working on multi-process QEMU at Oracle, including presenting it at KVM 2019.
EU

Elena Ufimtseva

Principal Member of Technical Staff, Oracle
Currently working at Oracle on QEMU multiprocess disaggregation project. Before was working on the implementation of vNUMA topology for guests in Xen hypervisor, as well as Xen livepatching and working on various Xen hypervisor improvements and issues. Previously had given a talk... Read More →



Friday November 1, 2019 16:15 - 16:45 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES

16:45 CET

Bring QEMU to Micro Service World - Xiao Guangrong & Zhang Yulei, Tencent Cloud
Recently more and more services, particularly micro services, have been moved from VMs to containers. Due to container's native infrastructure, cloud providers are seeking tech to create a more secured multi-tenant environment such as firecrack from AWS.
But using a dedicated hypervisor for micro service would bring extra burden to develop and maintain respectively. Furthermore, the improvement we add for one could benifit another. How about leveraging QEMU to fulfill the requirements of micro services? That is exactly what we did at Tencent Cloud.
We will share our works to adapt QEMU to fast deploy intensive micro services in a extremely short period ( < 35 ms) with less resource utilization which is comparable to containers that includes directly starting a VM from the parent, C/R QEMU to start a new VM, modularizing QEMU, reducing resource usage for both QEMU & Linux VMs etc.

Speakers
XG

Xiao Guangrong

Senior Software Engineer, Tencent Cloud
Xiao Guangrong is a Linux Kernel developer working on Ftrace, MM, Btrfs but his main interest is KVM. As a active contributor, he was invited to give some presentations at some conferences: Japan LinuxCon 2011, Japan LinuxCon 2012 China CLK 2012, KVM Forum 2016, 2017, 2018. He is... Read More →
YZ

Yulei Zhang

Senior Software Engineer, Tencent
Yulei has more than 10 years experienced software developer working in Virtualization area. Used to work on GFX driver and involve in Intel GPU virtualization technology(a.k.a Intel GVT-g). He is currently a senior software developer Tencent Cloud, his recent presentations were: "Adaptive... Read More →



Friday November 1, 2019 16:45 - 17:15 CET
Forum 3
  KVM Forum Track 2
  • Session Slides Included YES
 
Filter sessions
Apply filters to sessions.