[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH/RFC] Fix xsave bug on older Xen hypervisors



On 07.09.2012 16:54, Konrad Rzeszutek Wilk wrote:
>>> But iirc that bad patch is a Linux side one (i.e. you're trying to fix
>>> something upstream that isn't upstream)?
>>>
>> Right, so the patch that this improves upon, and that Fedora and Ubuntu are
>> currently carrying is not upstream because:
>>
>> a) It's crap, it cripples upstream xen users, but doesn't impact RHEL xen
>> users because xsave was never supported there.
>>
>> b) The hypervisor was patched to make it unnecessary quite some time ago,
>> and we hoped EC2 would eventually pick up that correct patch and we could
>> drop the crap kernel patch.
>>
>> Unfortunately this has not happened. We are at a point where EC2 really is
>> a quirk that has to be worked around. Distros do not want to maintain
>> a separate EC2 build of the kernel, so the easiest way is to cripple
>> current upstream xen users.  This quirk is unfortunately the best possible
>> solution.  Having it upstream also makes it possible for any user to build
>> an upstream kernel that will run on EC2 without having to dig a random
>> patch out of a vendor kernel.
> 
> Sure. Jan is asking though for actual confirmation that the upstream kernel
> does indeed go belly up without a workaround.
> And whether this patch (which I would did since Canonical is carrying it) does
> fix the issue.

It is really hard to tell. It might even be that all of the hosts on EC2 are now
upgraded. There might be different version around. Even back when the problem
was found it would not always happen.

So it is, still a bit hackish, an attempt to play safe. All that is known is
that there happened to be hosts running Xen 3.something which would do that.
Historical evidence might be:

commit 389a3c02496dd1b399bb0efd005e9fa2be24e9ee
Author: Jeremy Fitzhardinge <jeremy@xxxxxxxx>
Date:   Tue Sep 18 22:46:33 2007 -0700

    xen: don't bother trying to set cr4

    Xen ignores all updates to cr4, and some versions will kill the domain if
    you try to change its value.  Just ignore all changes.

Of course this is ancient v2.6.23 and it was later relaxed to just filter out
some flags:

commit 2956a3511c8c5dccb1d4739ead17c7c3c23a24b7
Author: Jeremy Fitzhardinge <jeremy@xxxxxxxx>
Date:   Mon May 26 23:31:04 2008 +0100

    xen: allow some cr4 updates

    The guest can legitimately change things like cr4.OSFXSR and
    OSXMMEXCPT, so let it.

But whether there are still hosts out there running a bad version of the HV is
hard to say. EC2 may or may not be the only case (or not at all anymore). For
upstream Linux it would be a valid decision either way. Not adding a quirk
because the use-case is so small. Or adding it because it avoids special patches
in distros and forcing those bits off on Xen 3 hosts is an acceptable drawback.

At least posting it here would allow those who carry the older more intrusive
hack to replace that. So we do not run again into that mess like when xsave was
half-disabled by guests with that patch and hosts supporting it.

> 
> I am still a newbie on the Amazon EC2 upload your kernel thing (hint, would
> appreciate somebody taking this patch and trying it out).
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxx
> http://lists.xen.org/xen-devel
> 


Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.