lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 23 Dec 2009 19:51:50 +0100
From:	Ingo Molnar <mingo@...e.hu>
To:	Andi Kleen <andi@...stfloor.org>
Cc:	Anthony Liguori <anthony@...emonkey.ws>,
	Bartlomiej Zolnierkiewicz <bzolnier@...il.com>,
	Gregory Haskins <gregory.haskins@...il.com>,
	Avi Kivity <avi@...hat.com>, kvm@...r.kernel.org,
	Andrew Morton <akpm@...ux-foundation.org>,
	torvalds@...ux-foundation.org,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	netdev@...r.kernel.org,
	"alacrityvm-devel@...ts.sourceforge.net" 
	<alacrityvm-devel@...ts.sourceforge.net>
Subject: Re: [GIT PULL] AlacrityVM guest drivers for 2.6.33


* Andi Kleen <andi@...stfloor.org> wrote:

> > - Are a pure software concept and any compatibility mismatch is                                      
> >   self-inflicted. The patches are in fact breaking the ABI to KVM                                                
> 
> In practice, especially considering older kernel releases, VMs behave like 
> hardware, with all its quirks, compatibility requirements, sometimes not 
> fully understood, etc.

I stopped reading your reply here. That's not actually fully true of KVM, at 
all.

Virtualization isnt voodoo magic with some hidden souce in some magic hardware 
component that no-one can understand fully. This isnt some mystic hardware 
vendor coming up with some code and going away in the next quarter, with 
barely anything documented and thousands of users left with hardware 
components which we need to support under Linux somehow.

This is Linux virtualization, where _both_ the host and the guest source code 
is fully known, and bugs (if any) can be found with a high degree of 
determinism. This is Linux where the players dont just vanish overnight, and 
are expected to do a proper job.

Yes, there's (obviously) compatibility requirements and artifacts and past 
mistakes (as with any software interface), but you need to admit it to 
yourself that your "virtualization is sloppy just like hardware" claim is just 
a cheap excuse to not do a proper job of interface engineering.

Thanks,

	Ingo
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ