VM/ESA and z/VM
Any ‘privileged’ instructions are intercepted and
simulated on behalf of the guests. (Think kernel vs.
user space, but at an instruction level.)
Generally, VM ‘owns’ the hardware unless special
steps are taken to dedicate something to a guest.
VM allows dynamic creation and destruction of virtual
resources, such as disks (DASD), CTC connections,
storage, I/O paths, etc.
VM will allow you to control how much CPU,
virtual storage, disk space etc., that a given guest
will receive, as well as its priority.
Copyright 2001 by Mark Post