对于性能而言,使用设备透传可以获得近乎本机的性能。
For performance, near-native performance can be achieved using device passthrough.
这是一个串口和以太网口的透传转换程序,目前只是支持单个串口。
This is a small application that bridges the TCP/IP layer to a Serial (COM) port.
使用最新的支持虚拟化的处理器架构,有多个管理程序和虚拟化解决方案支持设备透传。
Using the latest virtualization-enhanced processor architectures, a number of hypervisors and virtualization solutions support device passthrough.
在探索透传技术之前,让我们先讨论一下如今设备模拟在两个管理程序架构中是如何工作的。
Before we jump into passthrough, let's explore how device emulation works today in two hypervisor architectures.
在多数情况下,客户操作系统(域为0)必须被编译为支持透传,这通常作为一个内核构建时选项提供。
In most cases, the guest operating system (domain 0) must be compiled to support passthrough, which is available as a kernel build-time option.
Intel和AMD都在它们的新一代处理器架构中提供对设备透传的支持(以及辅助管理程序的新指令)。
Both Intel and AMD provide support for device passthrough in their newer processor architectures (in addition to new instructions that assist the hypervisor).
您将在Xen和KVM以及其他管理程序中发现设备透传支持(使用VT-d或IOMMU)。
You'll find support for device passthrough (using VT-d or IOMMU) in Xen and KVM as well as other hypervisors.
因此,新的处理器提供DMA地址转换和权限检查以实现有效的设备透传,而不是捕获并模拟对管理程序下的物理设备的访问。
So, instead of catching and emulating access to physical devices below the hypervisor, new processors provide DMA address translation and permissions checking for efficient device passthrough.
另外,您将在libvirt(以及virsh)中发现设备透传的配置支持,这为底层管理程序使用的配置模式提供一个抽象。
Additionally, you'll find configuration support for device passthrough in libvirt (along with virsh), which provides an abstraction to the configuration schemes used by the underlying hypervisors.
因此,在最高层面上,设备透传就是向一个特定客户操作系统提供一种设备隔离,以便该设备能够被那个客户操作系统独占使用(见图3)。
So, at the highest level, device passthrough is about providing an isolation of devices to a given guest operating system so that the device can be used exclusively by that guest (see Figure 3).
因此,在最高层面上,设备透传就是向一个特定客户操作系统提供一种设备隔离,以便该设备能够被那个客户操作系统独占使用(见图3)。
So, at the highest level, device passthrough is about providing an isolation of devices to a given guest operating system so that the device can be used exclusively by that guest (see Figure 3).
应用推荐