VM/ESA and z/VM
Any �privileged� instructions are intercepted and
simulated on behalf of the guests. (Think kernel vs.
user space, but at an instruction level.)
Generally, VM �owns� the hardware unless special
steps are taken to dedicate something to a guest.
VM allows dynamic creation and destruction of virtual
resources, such as disks (DASD), CTC connections,
storage, I/O paths, etc.
VM will allow you to control how much CPU,
virtual storage, disk space etc., that a given guest
will receive, as well as its priority.
Copyright 2001 by Mark Post