lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4AF38D7C.40604@novell.com>
Date:	Thu, 05 Nov 2009 21:44:12 -0500
From:	Gregory Haskins <ghaskins@...ell.com>
To:	"alacrityvm-devel@...ts.sourceforge.net" 
	<alacrityvm-devel@...ts.sourceforge.net>,
	alacrityvm-users@...ts.sourceforge.net
CC:	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"kvm@...r.kernel.org" <kvm@...r.kernel.org>, netdev@...r.kernel.org
Subject: [ANNOUNCE] AlacrityVM v0.2 is released

We (the AlacrityVM team) are pleased to announce the availability of the
v0.2 release.  There are numerous tweaks, fixes, and features that we
have added since the v0.1 days.  Here are a few of the key highlights.

*) VENET support:
   *) zero-copy transmits (guest memory is paged directly to the
physical adapter on the host, where applicable)
   *) "SAR offloading" (essentially bi-directional GSO with "64k MTU")
   *) pre-mapped descriptors to reduce latency
   *) pre-loading of mmu context to reduce latency

*) shm-signal's are now routable (e.g. future MQ support)

*) vbus is optionally managed in its entirely from the rebundled qemu
   *) "-net venet-tap" will fully initialize the interface
internally..no more scripting!

*) vbus components are automatically reaped when the guest exits, even
if the exit is not clean.

We will update the performance numbers ASAP and announce any changes.
For further details, please visit our wiki:

http://developer.novell.com/wiki/index.php/AlacrityVM

Kind Regards,
-Greg


Download attachment "signature.asc" of type "application/pgp-signature" (268 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ