krocz | jaime date |
---|---|
Hackers. "Q&A about linux kernel. Closing Ceremony". Transtaltion #redes. | |
Comentaries #qc' | |
Hackers. "Q&A about linux kernel. Closing Ceremony". Translation #redes. | |
Comentaries #qc' | |
damage | los que ayudaran con la traduccion porfavor dirijanse a #redes |
> jaime no logea ? | |
krocz | jaime startlogs #linux |
krocz | personas que ayudaran en la traduccion dirigirse a #redes y hablar |
con damage | |
riel | ok, I'd like to welcome you to the closing session of this year's Umeet |
conference | |
riel | this year we're doing a question & answer session on the kernel, |
since it was very popular the last time we did one | |
has joined #linux | |
riel | but first, I'd like to thank a few people |
riel | the Umeet organizers, who have been working hard to make these 2 |
weeks of conferences possible | |
riel | and the translators, who are translating most of the talks in #redes |
riel | and today, of course, our panel members |
riel | we got a number of kernel hackers who you can ask questions to in |
the next hour or so | |
riel | I'll try to introduce them in roughly alphabetical order |
riel | Dave Jones - Fedora kernel maintainer, low level x86 hacker and |
device driver hacker | |
riel | Greg KH - device driver and device model hacker |
riel | Marcelo Tosatti - 2.4 kernel maintainer |
riel | Matthew Wilcox - developer of HPPA Linux, Debian developer and |
many more things ;) | |
riel | William Lee Irwin - memory management and scalability hacker |
riel | and myself, but I'm mostly moderating the talk today ;) |
riel | if you have any questions, please ask them in #qc |
riel | then the kernel hackers will cut&paste your question here, and |
answer them | |
riel | heh, looks like we opened with a trick question ;( |
riel | <trulux> davej, i've backported the selinux hooks for mount contexts |
used in Fedora, what changes are needed outside the LSM/SE structure to make | |
them working smoothly? | |
davej | I don't really have enough background with selinux to provide an |
answer on that one, sorry. | |
riel | <voice=rusty> ok, any *OTHER* questions ? </voice> |
davej | next? 8) |
gregkh | rene> gregkh: what is your opinion of the current state of the |
device model? anyspecific directions you | |
riel | <rene> gregkh: what is your opinion of the current state of the device |
model? anyspecific directions you want it to go which it isn't yet? | |
gregkh | want it to go which it isn't yet? |
gregkh | The current state is pretty good. It's stable, and works for almost |
everyone. | |
gregkh | that being said, there is some places that need work: |
gregkh | - locking. The internal locking to the device model and sysfs |
needs to be reworked in order for us to do more advanced things. I'll be working | |
on that next month. | |
#linux | |
gregkh | - class support. We need to support children of class devices so |
we can move /sys/block into /sys/class/ | |
gregkh | - manual bind/ unbind of devices. We need to get the locking |
changes finished so we can do this. | |
gregkh | - make things simpler. It's still too hard in places to use the driver |
model. We need more things like the class_simple type of interface. | |
gregkh | - and finally, better documentation. But LDD3 will help solve that |
one. | |
reset by peer) | |
riel | <mcr> I have been using User-Mode-Linux for nightly regression |
testing of the KLIPS IPsec code. This has proven very effective. I would like to see | |
more use of UML for regression testing of non-hardeware driver related items. | |
Perhaps the assembled people could tell us what is keeping them from testing | |
more extensively with UML. | |
riel | I'll try to provide a short answer on my reasons ;) |
riel | I am actually planning to use Xen virtualisation for testing |
riel | and I have used User Mode Linux for debugging kernel code |
riel | however, UML does behave differently from the real kernel in some |
aspects, and it depends on the host kernel for strange corner case behaviour | |
riel | it is also not very suitable for performance testing |
riel | I know that cluster people and some network developers are using |
UML for testing, though | |
willy | <EricB> It seems that most vendors now ship their own kernel. Is this |
becoming a problem or are the vendors being good about submitting patches for | |
inclusion in linux? | |
willy | Vendors have historically shipped their own kernels, and they used |
to have | |
willy | much more divergence from the upstream kernel than they currently |
do. | |
willy | The distribution vendors are better than before about submitting |
patches | |
willy | back to upstream. In particular, the hardware vendors are getting the |
willy | message that they need to submit their code and APIs to the |
upstream | |
willy | kernel, not try to get the extensions into a distributor kernel first. |
riel | as one of the distribution people, I've got another thing to add to this ;) |
riel | two things, actually |
riel | 1) Linux distributions have a QA team of maybe a few dozen people, |
while the upstream kernel has a million users - so any change a distribution makes | |
is less well tested than the upstream kernel, and a risk | |
riel | 2) it is a lot of work to port patches from one kernel version to the next, |
so for Linux distributions it actually saves work if their changes are sent to the | |
upstream kernel first | |
davej | from a fedora perspective, we're actually aiming at shipping less |
patches with each release, and getting closer to that goal every time. | |
davej | FC3 was around 40-50 patches away from mainline at time of |
release, and many of those were post 2.6.9 backports fixing various things. | |
davej | after release of FC3, the subsequent updates have increased the |
patch count somewhat, but again, most of those are post 2.6.9 fixes taken from | |
upstream. | |
davej | the only bits that aren't, get pushed upstream so that when the |
2.6.10 based fedora kernel is rebased, we get to pick up those fixes for free. | |
gregkh | And, as one of the Gentoo kernel maintainers, our kernel tree only |
has 5 patches that are not upstream already. | |
davej | impressive 8) |
gregkh | and those patches are moving upstream soon. |
gregkh | < damjan> gregkh: while on the device model, is power |
management all right, but drivers implement it poorly or it needs work too? | |
gregkh | power management is still under heavy design and development. |
If you are interested in this, please join the new linux-pm mailing | |
gregkh | list that is hosted by osdl. |
riel | <trulux> riel, what's the opinion of the kernel hackers on NX |
implementations and memory protection enhancements: Exec Shield, PaX.... etc? | |
riel | ok, I've got a "non-standard" opinion on this question ;) |
riel | I know that PaX protects against a few things that Exec-Shield does |
not protect against as well | |
riel | however, I think that the security conscious (aka paranoid) system |
administrators are not the main target for these patches | |
EOF from client) | |
riel | the main goal of these patches is to protect systems that do not get all |
security updates immediately | |
riel | so I think the best of the two solutions is the one that can be enabled |
without breaking any programs | |
riel | so sysadmins will not have to disable the security mechanism |
riel | Fedora already has execshield support, and I am happy to know that |
other distributions (debian and gentoo) are also hardening their distribution | |
gregkh | < roel> with the new development model, having a less |
stable-on-all-times kernel, won't we depend even more on patched distribution | |
kernels? | |
gregkh | roel: you always depended on a "patched distribution" if you |
wanted a stable kernel tree. | |
gregkh | Now we just have finally acknolodged what we have been doing |
for years. | |
gregkh | that we have a relativly active kernel development cycle, and if you |
want a tested and supported kernel, use a distro. | |
gregkh | if you want the latest hardware support and bugfixes, use a distro |
that tracks mainline quickly | |
gregkh | (like Fedora, Debian and Gentoo.) |
gregkh | if you want "stable, will never change in 5 years", then use an |
"enterprise" distro, like RHEL or SLES. | |
gregkh | you have options. |
willy | I only use a patched distribution kernel on one of my machines; all |
willy | the others (including my wife's) run kernels I've built myself. They're |
willy | stable enough; her laptop is running 2.6.5 and has been up for 135 |
days. | |
com) has left #linux | |
riel | <trulux> riel, also, is the FreeBSD jails port going to be integrated into |
the kernel? | |
riel | ok, this is one with many answers ;) |
riel | first, Linux _does_ have a patch available that is like BSD jail, it is |
called vserver | |
riel | and people are using it in the same way |
riel | selinux can also be used to restrict what programs can do, though |
that requires more care | |
riel | with proper tools, I think selinux configuration should also be |
manageable | |
riel | of course, in either case your system is still vulnerable to kernel |
exploits | |
riel | that leads us to the third answer to this question: virtualisation |
riel | if you run untrusted services in their own virtual machine, with their |
own kernel, then even a local kernel exploit could still leave the rest of the system | |
safe (running on other virtual machines) | |
willy | <weasel> Not a very technical question, but one regarding release |
policy. Currently it often takes many weeks until known security problems get | |
fixed not only in BK, but in a release. Do you intent to make use of x.y.z.N releases | |
which fix such critical bugs quickly in the future, or at least make patches more | |
widely known? | |
willy | I agree with weasel that we don't do a very good job of fixing / |
willy | announcing security bug fixes. I haven't heard either Linus or |
Andrew | |
willy | mention a desire to do security point releases; I suspect they're not |
willy | interested in it themselves and assuming that if there is sufficient |
willy | interest, someone will step forward to take care of it. |
reset by peer) | |
riel | distributions are taking care of it ;) |
willy | well, distributions are taking care of it for their own kernels, but it'd |
be nice if someone stepped up to manage security patches for the kernel.org | |
kernels. | |
davej | willy: which Alan has been doing to some degree in his -ac kernels. |
davej | but I agree, a real .1 subrelease would be better |
riel | ok, now for a good question, for which I do not have a good answer ... |
riel | <ducky> what do you think about, whats the most strong barrier to the |
enterprises to migrate all their servers to 2.6 | |
davej | theres no 2.7 to backport cool 0day enterprise features from yet. |
gregkh | fear, and people not wanting to change things that aren't broken :) |
riel | I think one of the reasons is that 2.6 has not been tested well in a |
production environment. There are few people on the linux-kernel mailing list who | |
run a huge database on a 16 CPU system with 64GB memory - so who knows if it'll | |
work right ? | |
willy | possibly they're using some really old device driver that doesn't |
work in 2.6 yet | |
has left #linux | |
willy | <EricB> Is there going to be any effort made to split up the source by |
arch? Most people only need one or two | |
willy | No, we're not keen on pruning / trimming the source tree. While it |
willy | would make life easier for people who download the kernel tarball, |
it'd | |
willy | be much more load on the mirrors and on developers. The .diff files |
willy | aren't awfully big, so you only need to download one copy of the |
tarball. | |
marcelo | <ducky> what about your experiences as a the 2.4 linux kernel |
maintainer ? | |
marcelo | I have learned a lot during these years, about relationship with |
other developers/members | |
marcelo | of the community and also about technical matters. I've came to |
know and interact with a large | |
marcelo | number of developers. |
marcelo | Maintenance of a stable Linux kernel tree is a big responsability, |
and its a long-term | |
marcelo | commitment. It has occupied most of my time for during these |
years. | |
marcelo | Its not an easy task - one feels responsible for all bugs which |
might appear, that can | |
marcelo | be very frustating at times. |
marcelo | s/my time for/my time/ |
marcelo | But in the end it has been a wonderful personal experience, I |
have learned a lot from it | |
marcelo | and continue doing so. |
willy | mcr solicited opinions from people other than riel on use of UML. |
Most of my kernel changes are hardware related, so booting a UML kernel | |
wouldn't help test my changes. For people like network developers and perhaps | |
VM hackers, UML is great, but when you need to alter device driver or PCI bus | |
walking code, it's not much good. Also, a lot of the time I work on stuff that is | |
ia64-specific, and I don't think there's UML for ia64 yet. | |
gregkh | < mb_> What about the BKL. Can we expect that there will be the |
day when it disappears? Is work going on there? | |
gregkh | There is a bit of bkl work going on in trying to get rid of it in the |
ioctl calls, but | |
gregkh | the main "get rid of the bkl" work is over. The developers who |
worked on it are off doing other things now, and | |
gregkh | unless there is some measured benifits from dropping it in the rest |
of the kernel, I doubt it will ever go away completly. | |
willy | There are still large parts of the kernel that use the BKL, but they're |
almost all infrequently called paths. Contention on the BKL is very low these | |
days; there are many more interesting problems to attack in terms of scalability. | |
riel | <warren> Q: Are we still plagued by VM balancing problems? Will |
there ever be an end to it? | |
riel | the VM has the big problem that nobody agrees on exactly what it |
should do, so it's not possible to create a test set that ensures it does the right | |
thing ;) | |
riel | for that reason, I suspect we will have VM balancing problems for a |
while more | |
riel | also, the VM has a tendency to break when you optimise it too much, |
so if you optimise for one benchmark, you probably make performance worse for | |
something else | |
riel | this is a fundamental problem, because the VM has to swap |
_something_ out when memory is low | |
riel | and there is always some program that will use that memory again in |
the future | |
riel | the task of the VM is to swap out the page that makes the VM suck the |
least ;) | |
gregkh | < rene> while on the topic. where _is_ early userspace? :) |
gregkh | The "early userspace" code is already in the 2.6 kernel today. |
Look at | |
gregkh | the initramfs code, there is documentation on how to use it in the |
gregkh | Documentation/ directory. People are still working on merging in |
gregkh | the klibc code into the kernel tree, when that is done, then we can |
begin | |
gregkh | to pull pieces of the kernel boot process logic out of kernelspace |
gregkh | and into userspace, yet having them remain as part of the kernel |
gregkh | build process. For more info on this, see the klibc mailing list |
gregkh | archives. |
willy | <tklauser> How do driver developers and lowlevel hackers test their |
code? Isn't it difficult to debug code at such a low level? | |
willy | I think people believe there's some kind of mystique to kernel |
hacking. | |
willy | There isn't really. It's just that when you write bad code, the entire |
willy | machine crashes, not just the program you were writing. So we test |
our | |
willy | code in much the same way that other hackers do. Everyone's |
different; I | |
willy | tend to write code, compile it, fix compile problems, boot it (usually |
on | |
willy | a different machine ;-), fix boot problems, stress it, fix those |
problems. | |
willy | Once I can't break it any more, I send it out for other people to try |
willy | to break it. They usually do ... |
riel | <krocz> riel: how hard would it be to run grsecurity with xen? |
riel | well, every Xen guest runs its own kernel |
riel | so it should be relatively easy to run grsecurity on such a kernel |
riel | the only parts that may need porting are the architecture specific |
ones, but those should be few | |
willy | <damjan> What's the general feeling amongst the main kernel |
hackers about user-space filesystems (like FUSE), will it go in mainline? Also what | |
about per-user (or per process) VFS namespaces ... Also what about overlay | |
mounts? | |
willy | The FUSE guy seems really interested in getting his code merged. |
willy | Linus found some problems with it, but I think they're fixed now. |
willy | If he's persistent, continues to fix bugs and doesn't get irritating, |
willy | that code may be integrated fairly soon. |
willy | Per process VFS namespaces are already implemented. I think |
overlay | |
willy | mounts can be done most easily by writing a new filesystem (I believe |
willy | this is how BSD implements it). So it's easy enough, just write a |
willy | new filesystem! |
riel | <krocz> what parts of the linux kernel does Xen patch? |
riel | Xen is a new pseudo-architecture, like User Mode Linux |
riel | so it patches arch/xen/ and adds some Xen specific virtual device |
drivers | |
riel | it reuses large parts of arch/i386/ to avoid code duplication |
riel | and touches a little bit of code elsewhere |
riel | <warren> Q: On the topic of filesystems, what will it take to enable use |
of mount --bind -o ro to have a filesystem read-only in one location, read-write in | |
another simultaneously? Existing patches (from vserver authors) against 2.6 were | |
rejected a few months ago. Any further work in this direction? | |
riel | I am not aware of further work here, though the vserver people may be |
working on it still. | |
willy | <damjan> I also have a question about improving robustness of the |
kernel, if you got processes stucked somewhere in the kernel (waiting on NFS, | |
CIFS or bad CD) the only thing you can do is a restart ... can something be done | |
about it? | |
willy | Actually, Linus posted an outline of a way to handle this a few years |
ago. | |
willy | http://seclists.org/lists/linux-kernel/2002/Aug/0467.html |
willy | Nobody's implemented it yet; you could be the one to do it ;-) |
riel | ok, it looks like we are out of questions (and out of time) now |
riel | thanks to everybody for being at this year's Umeet conference |
riel | I'll hand over the virtual microphone to MJesus, who coordinates |
Uninet ;) | |
willy | I'd like to thank Rik for his efforts in herding cats (aka organising |
kernel hackers) | |
riel | I would like to thank all the speakers, panel members, conference |
organisers, translaters ... | |
riel | ... and of course, the audience |
riel | thank you |
exiting) | |
krocz | CLAP CLAP CLAP CLAP |
krocz | CLAP CLAP CLAP CLAP |
krocz | CLAP CLAP CLAP CLAP |
krocz | CLAP CLAP CLAP CLAP |
fernand0 | plas plas plas plas plas plas plas plas plas plas plas plas |
fernand0 | plas plas plas plas plas plas plas plas plas plas plas plas |
fernand0 | plas plas plas plas plas plas plas plas plas plas plas plas |
fernand0 | plas plas plas plas plas plas plas plas plas plas plas plas |
fernand0 | plas plas plas plas plas plas plas plas plas plas plas plas |
fernand0 | plas plas plas plas plas plas plas plas plas plas plas plas |
damage | CLAP CLAP CLAP CLAP CLAP CLAP CLAP CLAP CLAP |
damage | CLAP CLAP CLAP CLAP CLAP CLAP CLAP CLAP CLAP |
damage | CLAP CLAP CLAP CLAP CLAP CLAP CLAP CLAP CLAP |
^ogro^ | bravo!!!!!!! |
jaime | ^ogro^: Aviso #1 => Agradeceria mucho que no escribieras !!!!!!! otra |
vez | |
fernand0 | plas plas plas plas plas plas plas plas plas plas plas plas |
ducky | clap clap clap clap clap clap clap clap |
fernand0 | plas plas plas plas plas plas plas plas plas plas plas plas |
fernand0 | plas plas plas plas plas plas plas plas plas plas plas plas |
ducky | clap clap clap clap clap clap clap clap |
ducky | clap clap clap clap clap clap clap clap |
ducky | clap clap clap clap clap clap clap clap |
ducky | clap clap clap clap clap clap clap clap |
krocz | jaiem endlog #linux |
jjose | PLAS PLAS PLAS |
#linux | |
krocz | jaime endlog #linux |
jaime | krocz: Log cerrado! |
krocz | thanks to riel and all kernel hacker |
roel | indeed, thanks |
> clap clap clap clap clap clap clap clap clap clap | |
> clap clap clap clap clap clap clap clap clap clap | |
> clap clap clap clap clap clap clap clap clap clap | |
> clap clap clap clap clap clap clap clap clap clap | |
> clap clap clap clap clap clap clap clap clap clap | |
> clap clap clap clap clap clap clap clap clap clap | |
> clap clap clap clap clap clap clap clap clap clap | |
> traslator are still reading :)) |
The Organizing Comittee