[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v5 1/4] domctl: introduce a new domain create flag, XEN_DOMCTL_CDF_evtchn_fifo, ...
On Fri, 4 Dec 2020, Andrew Cooper wrote: > On 04/12/2020 11:45, Julien Grall wrote: > > Hi, > > > > I haven't looked at the series yet. Just adding some thoughts on why > > one would want such option. > > > > On 04/12/2020 09:43, Jan Beulich wrote: > >> On 04.12.2020 09:22, Paul Durrant wrote: > >>>> From: Jan Beulich <jbeulich@xxxxxxxx> > >>>> Sent: 04 December 2020 07:53 > >>>> > >>>> On 03.12.2020 18:07, Paul Durrant wrote: > >>>>>> From: Jan Beulich <jbeulich@xxxxxxxx> > >>>>>> Sent: 03 December 2020 15:57 > >>>>>> > >>>>>> ... this sound to me more like workarounds for buggy guests than > >>>>>> functionality the hypervisor _needs_ to have. (I can appreciate > >>>>>> the specific case here for the specific scenario you provide as > >>>>>> an exception.) > >>>>> > >>>>> If we want to have a hypervisor that can be used in a cloud > >>>>> environment > >>>>> then Xen absolutely needs this capability. > >>>> > >>>> As per above you can conclude that I'm still struggling to see the > >>>> "why" part here. > >>>> > >>> > >>> Imagine you are a customer. You boot your OS and everything is just > >>> fine... you run your workload and all is good. You then shut down > >>> your VM and re-start it. Now it starts to crash. Who are you going > >>> to blame? You did nothing to your OS or application s/w, so you are > >>> going to blame the cloud provider of course. > >> > >> That's a situation OSes are in all the time. Buggy applications may > >> stop working on newer OS versions. It's still the application that's > >> in need of updating then. I guess OSes may choose to work around > >> some very common applications' bugs, but I'd then wonder on what > >> basis "very common" gets established. I dislike the underlying > >> asymmetry / inconsistency (if not unfairness) of such a model, > >> despite seeing that there may be business reasons leading people to > >> think they want something like this. > > > > The discussion seems to be geared towards buggy guest so far. However, > > this is not the only reason that one my want to avoid exposing some > > features: > > > > 1) From the recent security issues (such as XSA-343), a knob to > > disable FIFO would be quite beneficials for vendors that don't need > > the feature. > > > > 2) Fleet management purpose. You may have a fleet with multiple > > versions of Xen. You don't want your customer to start relying on > > features that may not be available on all the hosts otherwise it > > complicates the guest placement. > > > > FAOD, I am sure there might be other features that need to be > > disabled. But we have to start somewhere :). > > Absolutely top of the list, importance wise, is so we can test different > configurations, without needing to rebuild the hypervisor (and to a > lesser extent, without having to reboot). > > It is a mistake that events/grants/etc were ever available unilaterally > in HVM guests. This is definitely a step in the right direction (but I > thought it would be too rude to ask Paul to make all of those CDF flags > at once). +1 For FuSa we'll need to be able to disable them at some point soon.
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |