lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Thu, 20 Mar 2014 23:40:08 +0100
From:	Paolo Bonzini <>
To:	"H. Peter Anvin" <>, Waiman Long <>,
	Thomas Gleixner <>,
	Ingo Molnar <>, Arnd Bergmann <>,
	Peter Zijlstra <>
CC:	Jeremy Fitzhardinge <>,
	Raghavendra K T <>,
	Gleb Natapov <>,
	Aswin Chandramouleeswaran <>,
	Andi Kleen <>,
	Michel Lespinasse <>,
	Boris Ostrovsky <>,,,,,
	"Paul E. McKenney" <>,
	Scott J Norton <>,
	Steven Rostedt <>,
	Chris Wright <>,
	Alok Kataria <>,,
	Chegu Vinod <>,
	Oleg Nesterov <>,,
	David Vrabel <>,
	Andrew Morton <>
Subject: Re: [PATCH v7 06/11] pvqspinlock, x86: Allow unfair queue spinlock
 in a KVM guest

Il 20/03/2014 23:29, H. Peter Anvin ha scritto:
> > No!  Please do what I asked you to do.  You are not handling Hyper-V or
> > VMWare.  Just use X86_FEATURE_HYPERVISOR and it will cover all
> > hypervisors that actually follow Intel's guidelines.
> And for those that don't, we should turn on X86_FEATURE_HYPERVISOR in
> the Linux enumeration code as we do for other features we detect
> independently.

Yeah, but all the hypervisors we detect right now are fine.  Not 
surprising, since Microsoft won't certify Windows on your hypervisor 
unless you set the bit, and KVM/Xen/VMware are all certified (Hyper-V 
does not go through the same certification, but sets it anyway).

I got a second-hand report that VirtualBox doesn't set it---and I 
haven't verified that yet---but we don't even try to detect vbox right now.

To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
More majordomo info at
Please read the FAQ at

Powered by blists - more mailing lists