lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 30 May 2012 08:45:57 -0700 From: "H. Peter Anvin" <hpa@...or.com> To: Jan Beulich <JBeulich@...e.com> CC: Borislav Petkov <bp@...en8.de>, Andre Przywara <andre.przywara@....com>, Jacob Shin <Jacob.Shin@....com>, mingo@...e.hu, jeremy@...p.org, tglx@...utronix.de, xen-devel@...ts.xensource.com, Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>, linux-kernel@...r.kernel.org Subject: Re: [Xen-devel] [PATCH] x86/amd: fix crash as Xen Dom0 on AMD Trinity systems On 05/30/2012 08:40 AM, Jan Beulich wrote: >>>> On 30.05.12 at 17:12, Borislav Petkov <bp@...en8.de> wrote: >> This current case should be a perfect example for why xen shouldn't be >> sprinkling code all over the place. > > Which means you're denying the benefits of para-virtualization > (at the base system level; perhaps it's less of a problem for you > when it comes to pv device drivers, which are generally > standalone entities) as that's what distinguishes Xen from all > other virtualization solutions Linux supports. > And it also denies the just atrocious cost of Xen grabbing random kernel internals and turning them into ABIs that we have to work around from that point on. This is particularly obnoxious because the cost is largely not borne by the Xen community but by the general Linux development. -hpa -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists