[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Patches for stable



On Fri, Apr 6, 2018 at 9:00 AM, Juergen Gross <jgross@xxxxxxxx> wrote:
> On 05/04/18 20:33, Boris Ostrovsky wrote:
>> On 04/05/2018 01:11 PM, Juergen Gross wrote:
>>> On 05/04/18 16:56, George Dunlap wrote:
>>>> On Thu, Apr 5, 2018 at 3:09 PM, Juergen Gross <jgross@xxxxxxxx> wrote:
>>>>> On 05/04/18 15:42, George Dunlap wrote:
>>>>>> On Thu, Apr 5, 2018 at 2:06 PM, Juergen Gross <jgross@xxxxxxxx> wrote:
>>>>>>> On 05/04/18 15:00, Boris Ostrovsky wrote:
>>>>>>>> On 04/05/2018 08:19 AM, Juergen Gross wrote:
>>>>>>>>> On 05/04/18 12:06, George Dunlap wrote:
>>>>>>>>>
>>>>>>>>>> Aren't there flags in the binary somewhere that could tell the
>>>>>>>>>> toolstack / Xen whether the kernel in question needs the RSDP table 
>>>>>>>>>> in
>>>>>>>>>> lowmem, or whether it can be put higher?
>>>>>>>>> Not really. Analyzing the binary whether it accesses the rsdp_addr in
>>>>>>>>> the start_info isn't the way to go, IMO.
>>>>>>>>>
>>>>>>>>> I've sent a patch to xen-devel adding a quirk flag to the domain's
>>>>>>>>> config to enable the admin special casing such an "old" kernel.
>>>>>>>> Can we backport latest struct hvm_start_info changes (which bumped
>>>>>>>> interface version) to 4.11 and pass RSDP only for versions >=1?
>>>>>>> And this would help how?
>>>>>>>
>>>>>>> RSDP address is passed today, the kernel just doesn't read it. And
>>>>>>> how should Xen know which interface version the kernel is supporting?
>>>>>>> And Xen needs to know that in advance in order to place the RSDP in
>>>>>>> low memory in case the kernel isn't reading the RSDP address from
>>>>>>> start_info.
>>>>>> But the kernel image has ELF notes, right?  You can put one that
>>>>>> indicates that this binary *does* know how to read the RSDP from the
>>>>>> start_info, and if you don't find that, put it in lowmem.
>>>>> Sow you would hurt BSD which does read the RSDP address correctly but
>>>>> (today) has no such ELF note.
>>
>>
>> This can be predicated on
>>     ELFNOTE(Xen, XEN_ELFNOTE_GUEST_OS,       .asciz "linux")
>>
>> BSD will behave as it does now. For linux we could add feature flag (or
>> errata flag). Unfortunately I don't see a way to extract major.minor
>> from the headers, otherwise we could use that.
>
> What's wrong with the config flag?

How do you know the config flag exists?  If you miss it in the release
notes, you just upgrade and have all your guests suddenly stop
booting.  You google around for an hour and discover that the shiny
new feature that the XenProject told you to use was purposely,
knowingly broken, and that now you need to set this flag in each of
your guest configs.  Then you have the question of when you can remove
the config flag.  Suppose someone is running Linux 4.15, then upgrades
to Linux 4.17, then wants to downgrade back to 4.15?

Even if this only takes half an hour of each administrator's time to
have to deal with for the next 2-3 years (which I think would be
optimistic), think of the total number of man-hours wasted and the
frustration and negative feelings generated having to deal with it.

*Lots* of people in the Linux community have Greg's attitude towards
breaking existing systems.  Even if he never said another word, a
large number of other people would feel the same way, and probably a
number would say so.  Heck, there'd be a chance that the Register
would pick up the story if it were in the release notes: "XenProject
releases 4.11, breaks shiny new feature just introduced in 4.10".

> Adding a mandatory ELF-Note which says "yes, I really comply to the
> interface" seems to be weird.

Yes, fundamentally it's a bit ugly to have a "Actually I really do
comply with the interface" flag.  But it's just a little flag tucked
in a header somewhere; the vast majority of the time nobody will see
it -- not even you.  It won't fundamentally make the interface
difficult to use, it won't have any input on the performance or the
size of the resulting binary; it won't tie us into a suboptimal
interface or prevent us from adding nice new features in the future.
It sounds like it won't even existing (compliant) FreeBSD kernels from
taking advantage of 1GiB pages.

Architectural purity is certainly a goal worth striving for, but in
this case the cost to our users is definitely not worth it.

 -George

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.