IV International Conference of Unix at Uninet
  • Presentation
  • Register
  • Program
  • Organizing Comittee
  • Listing of registered people
  • Translators team
Closing ceremony

kroczjaime date
Hackers. "Q&A about linux kernel. Closing Ceremony". Transtaltion #redes.
Comentaries #qc'
Hackers. "Q&A about linux kernel. Closing Ceremony". Translation #redes.
Comentaries #qc'
damagelos que ayudaran con la traduccion porfavor dirijanse a #redes
> jaime no logea ?
kroczjaime startlogs #linux
kroczpersonas que ayudaran en la traduccion dirigirse a #redes y hablar
con damage
rielok, I'd like to welcome you to the closing session of this year's Umeet
conference
rielthis year we're doing a question & answer session on the kernel,
since it was very popular the last time we did one
has joined #linux
rielbut first, I'd like to thank a few people
rielthe Umeet organizers, who have been working hard to make these 2
weeks of conferences possible
rieland the translators, who are translating most of the talks in #redes
rieland today, of course, our panel members
rielwe got a number of kernel hackers who you can ask questions to in
the next hour or so
rielI'll try to introduce them in roughly alphabetical order
rielDave Jones - Fedora kernel maintainer, low level x86 hacker and
device driver hacker
rielGreg KH - device driver and device model hacker
rielMarcelo Tosatti - 2.4 kernel maintainer
rielMatthew Wilcox - developer of HPPA Linux, Debian developer and
many more things ;)
rielWilliam Lee Irwin - memory management and scalability hacker
rieland myself, but I'm mostly moderating the talk today ;)
rielif you have any questions, please ask them in #qc
rielthen the kernel hackers will cut&paste your question here, and
answer them
rielheh, looks like we opened with a trick question ;(
riel<trulux> davej, i've backported the selinux hooks for mount contexts
used in Fedora, what changes are needed outside the LSM/SE structure to make
them working smoothly?
davejI don't really have enough background with selinux to provide an
answer on that one, sorry.
riel<voice=rusty> ok, any *OTHER* questions ? </voice>
davejnext? 8)
gregkh rene> gregkh: what is your opinion of the current state of the
device model? anyspecific directions you
riel<rene> gregkh: what is your opinion of the current state of the device
model? anyspecific directions you want it to go which it isn't yet?
gregkh              want it to go which it isn't yet?
gregkhThe current state is pretty good.  It's stable, and works for almost
everyone.
gregkhthat being said, there is some places that need work:
gregkh- locking.  The internal locking to the device model and sysfs
needs to be reworked in order for us to do more advanced things. I'll be working
on that next month.
#linux
gregkh- class support.  We need to support children of class devices so
we can move /sys/block into /sys/class/
gregkh- manual bind/ unbind of devices.  We need to get the locking
changes finished so we can do this.
gregkh- make things simpler.  It's still too hard in places to use the driver
model. We need more things like the class_simple type of interface.
gregkh- and finally, better documentation.  But LDD3 will help solve that
one.
reset by peer)
riel<mcr> I have been using User-Mode-Linux for nightly regression
testing of the KLIPS IPsec code. This has proven very effective. I would like to see
more use of UML for regression testing of non-hardeware driver related items.
Perhaps the assembled people could tell us what is keeping them from testing
more extensively with UML.
rielI'll try to provide a short answer on my reasons ;)
rielI am actually planning to use Xen virtualisation for testing
rieland I have used User Mode Linux for debugging kernel code
rielhowever, UML does behave differently from the real kernel in some
aspects, and it depends on the host kernel for strange corner case behaviour
rielit is also not very suitable for performance testing
rielI know that cluster people and some network developers are using
UML for testing, though
willy<EricB> It seems that most vendors now ship their own kernel. Is this
becoming a problem or are the vendors being good about submitting patches for
inclusion in linux?
willyVendors have historically shipped their own kernels, and they used
to have
willymuch more divergence from the upstream kernel than they currently
do.
willyThe distribution vendors are better than before about submitting
patches
willyback to upstream.  In particular, the hardware vendors are getting the
willymessage that they need to submit their code and APIs to the
upstream
willykernel, not try to get the extensions into a distributor kernel first.
rielas one of the distribution people, I've got another thing to add to this ;)
rieltwo things, actually
riel1) Linux distributions have a QA team of maybe a few dozen people,
while the upstream kernel has a million users - so any change a distribution makes
is less well tested than the upstream kernel, and a risk
riel2) it is a lot of work to port patches from one kernel version to the next,
so for Linux distributions it actually saves work if their changes are sent to the
upstream kernel first
davejfrom a fedora perspective, we're actually aiming at shipping less
patches with each release, and getting closer to that goal every time.
davejFC3 was around 40-50 patches away from mainline at time of
release, and many of those were post 2.6.9 backports fixing various things.
davejafter release of FC3, the subsequent updates have increased the
patch count somewhat, but again, most of those are post 2.6.9 fixes taken from
upstream.
davejthe only bits that aren't, get pushed upstream so that when the
2.6.10 based fedora kernel is rebased, we get to pick up those fixes for free.
gregkhAnd, as one of the Gentoo kernel maintainers, our kernel tree only
has 5 patches that are not upstream already.
davejimpressive 8)
gregkhand those patches are moving upstream soon.
gregkh< damjan> gregkh: while on the device model, is power
management all right, but drivers implement it poorly or it needs work too?
gregkhpower management is still under heavy design and development.  
If you are interested in this, please join the new linux-pm mailing
gregkhlist that is hosted by osdl.
riel<trulux> riel, what's the opinion of the kernel hackers on NX
implementations and memory protection enhancements: Exec Shield, PaX.... etc?
rielok, I've got a "non-standard" opinion on this question ;)
rielI know that PaX protects against a few things that Exec-Shield does
not protect against as well
rielhowever, I think that the security conscious (aka paranoid) system
administrators are not the main target for these patches
EOF from client)
rielthe main goal of these patches is to protect systems that do not get all
security updates immediately
rielso I think the best of the two solutions is the one that can be enabled
without breaking any programs
rielso sysadmins will not have to disable the security mechanism
rielFedora already has execshield support, and I am happy to know that
other distributions (debian and gentoo) are also hardening their distribution
gregkh< roel> with the new development model, having a less
stable-on-all-times kernel, won't we depend even more on patched distribution
kernels?
gregkhroel: you always depended on a "patched distribution" if you
wanted a stable kernel tree.
gregkhNow we just have finally acknolodged what we have been doing
for years.
gregkhthat we have a relativly active kernel development cycle, and if you
want a tested and supported kernel, use a distro.
gregkhif you want the latest hardware support and bugfixes, use a distro
that tracks mainline quickly
gregkh(like Fedora, Debian and Gentoo.)
gregkhif you want "stable, will never change in 5 years", then use an
"enterprise" distro, like RHEL or SLES.
gregkhyou have options.
willyI only use a patched distribution kernel on one of my machines; all
willythe others (including my wife's) run kernels I've built myself.  They're
willystable enough; her laptop is running 2.6.5 and has been up for 135
days.
com) has left #linux
riel<trulux> riel, also, is the FreeBSD jails port going to be integrated into
the kernel?
rielok, this is one with many answers ;)
rielfirst, Linux _does_ have a patch available that is like BSD jail, it is
called vserver
rieland people are using it in the same way
rielselinux can also be used to restrict what programs can do, though
that requires more care
rielwith proper tools, I think selinux configuration should also be
manageable
rielof course, in either case your system is still vulnerable to kernel
exploits
rielthat leads us to the third answer to this question:  virtualisation
rielif you run untrusted services in their own virtual machine, with their
own kernel, then even a local kernel exploit could still leave the rest of the system
safe (running on other virtual machines)
willy<weasel> Not a very technical question, but one regarding release
policy. Currently it often takes many weeks until known security problems get
fixed not only in BK, but in a release. Do you intent to make use of x.y.z.N releases
which fix such critical bugs quickly in the future, or at least make patches more
widely known?
willyI agree with weasel that we don't do a very good job of fixing /
willyannouncing security bug fixes.  I haven't heard either Linus or
Andrew
willymention a desire to do security point releases; I suspect they're not
willyinterested in it themselves and assuming that if there is sufficient
willyinterest, someone will step forward to take care of it.
reset by peer)
rieldistributions are taking care of it ;)
willywell, distributions are taking care of it for their own kernels, but it'd
be nice if someone stepped up to manage security patches for the kernel.org
kernels.
davejwilly: which Alan has been doing to some degree in his -ac kernels.
davejbut I agree, a real .1 subrelease would be better
rielok, now for a good question, for which I do not have a good answer ...
riel<ducky> what do you think about, whats the most strong barrier to the
enterprises to migrate all their servers to 2.6
davejtheres no 2.7 to backport cool 0day enterprise features from yet.
gregkh fear, and people not wanting to change things that aren't broken :)
rielI think one of the reasons is that 2.6 has not been tested well in a
production environment. There are few people on the linux-kernel mailing list who
run a huge database on a 16 CPU system with 64GB memory - so who knows if it'll
work right ?
willypossibly they're using some really old device driver that doesn't
work in 2.6 yet
has left #linux
willy<EricB> Is there going to be any effort made to split up the source by
arch? Most people only need one or two
willyNo, we're not keen on pruning / trimming the source tree.  While it
willywould make life easier for people who download the kernel tarball,
it'd
willybe much more load on the mirrors and on developers.  The .diff files
willyaren't awfully big, so you only need to download one copy of the
tarball.
marcelo<ducky> what about your experiences as a the 2.4 linux kernel
maintainer ?
marceloI have learned a lot during these years, about relationship with
other developers/members
marceloof the community and also about technical matters. I've came to
know and interact with a large
marcelonumber of developers.
marceloMaintenance of a stable Linux kernel tree is a big responsability,
and its a long-term
marcelocommitment. It has occupied most of my time for during these
years.
marceloIts not an easy task - one feels responsible for all bugs which
might appear, that can
marcelobe very frustating at times.
marcelos/my time for/my time/
marceloBut in the end it has been a wonderful personal experience, I
have learned a lot from it
marceloand continue doing so.
willymcr solicited opinions from people other than riel on use of UML.  
Most of my kernel changes are hardware related, so booting a UML kernel
wouldn't help test my changes. For people like network developers and perhaps
VM hackers, UML is great, but when you need to alter device driver or PCI bus
walking code, it's not much good. Also, a lot of the time I work on stuff that is
ia64-specific, and I don't think there's UML for ia64 yet.
gregkh< mb_> What about the BKL. Can we expect that there will be the
day when it disappears? Is work going on there?
gregkhThere is a bit of bkl work going on in trying to get rid of it in the
ioctl calls, but
gregkhthe main "get rid of the bkl" work is over.  The developers who
worked on it are off doing other things now, and
gregkhunless there is some measured benifits from dropping it in the rest
of the kernel, I doubt it will ever go away completly.
willyThere are still large parts of the kernel that use the BKL, but they're
almost all infrequently called paths. Contention on the BKL is very low these
days; there are many more interesting problems to attack in terms of scalability.
riel<warren> Q: Are we still plagued by VM balancing problems?  Will
there ever be an end to it?
rielthe VM has the big problem that nobody agrees on exactly what it
should do, so it's not possible to create a test set that ensures it does the right
thing ;)
rielfor that reason, I suspect we will have VM balancing problems for a
while more
rielalso, the VM has a tendency to break when you optimise it too much,
so if you optimise for one benchmark, you probably make performance worse for
something else
rielthis is a fundamental problem, because the VM has to swap
_something_ out when memory is low
rieland there is always some program that will use that memory again in
the future
rielthe task of the VM is to swap out the page that makes the VM suck the
least ;)
gregkh< rene> while on the topic. where _is_ early userspace? :)
gregkhThe "early userspace" code is already in the 2.6 kernel today.  
Look at
gregkhthe initramfs code, there is documentation on how to use it in the
gregkhDocumentation/ directory.  People are still working on merging in
gregkhthe klibc code into the kernel tree, when that is done, then we can
begin
gregkhto pull pieces of the kernel boot process logic out of kernelspace
gregkhand into userspace, yet having them remain as part of the kernel
gregkhbuild process.  For more info on this, see the klibc mailing list
gregkharchives.
willy<tklauser> How do driver developers and lowlevel hackers test their
code? Isn't it difficult to debug code at such a low level?
willyI think people believe there's some kind of mystique to kernel
hacking.
willyThere isn't really.  It's just that when you write bad code, the entire
willymachine crashes, not just the program you were writing.  So we test
our
willycode in much the same way that other hackers do.  Everyone's
different; I
willytend to write code, compile it, fix compile problems, boot it (usually
on
willya different machine ;-), fix boot problems, stress it, fix those
problems.
willyOnce I can't break it any more, I send it out for other people to try
willyto break it.  They usually do ...
riel<krocz> riel: how hard would it be to run grsecurity with xen?
rielwell, every Xen guest runs its own kernel
rielso it should be relatively easy to run grsecurity on such a kernel
rielthe only parts that may need porting are the architecture specific
ones, but those should be few
willy<damjan> What's the general feeling amongst the main kernel
hackers about user-space filesystems (like FUSE), will it go in mainline? Also what
about per-user (or per process) VFS namespaces ... Also what about overlay
mounts?
willyThe FUSE guy seems really interested in getting his code merged.
willyLinus found some problems with it, but I think they're fixed now.
willyIf he's persistent, continues to fix bugs and doesn't get irritating,
willythat code may be integrated fairly soon.
willyPer process VFS namespaces are already implemented.  I think
overlay
willymounts can be done most easily by writing a new filesystem (I believe
willythis is how BSD implements it).  So it's easy enough, just write a
willynew filesystem!
riel<krocz> what parts of the linux kernel does Xen patch?
rielXen is a new pseudo-architecture, like User Mode Linux
rielso it patches arch/xen/ and adds some Xen specific virtual device
drivers
rielit reuses large parts of arch/i386/ to avoid code duplication
rieland touches a little bit of code elsewhere
riel<warren> Q: On the topic of filesystems, what will it take to enable use
of mount --bind -o ro to have a filesystem read-only in one location, read-write in
another simultaneously? Existing patches (from vserver authors) against 2.6 were
rejected a few months ago. Any further work in this direction?
rielI am not aware of further work here, though the vserver people may be
working on it still.
willy<damjan> I also have a question about improving robustness of the
kernel, if you got processes stucked somewhere in the kernel (waiting on NFS,
CIFS or bad CD) the only thing you can do is a restart ... can something be done
about it?
willyActually, Linus posted an outline of a way to handle this a few years
ago.
willyhttp://seclists.org/lists/linux-kernel/2002/Aug/0467.html
willyNobody's implemented it yet; you could be the one to do it ;-)
rielok, it looks like we are out of questions (and out of time) now
rielthanks to everybody for being at this year's Umeet conference
rielI'll hand over the virtual microphone to MJesus, who coordinates
Uninet ;)
willyI'd like to thank Rik for his efforts in herding cats (aka organising
kernel hackers)
rielI would like to thank all the speakers, panel members, conference
organisers, translaters ...
riel... and of course, the audience
rielthank you
exiting)
kroczCLAP CLAP CLAP CLAP
kroczCLAP CLAP CLAP CLAP
kroczCLAP CLAP CLAP CLAP
kroczCLAP CLAP CLAP CLAP
fernand0plas plas plas plas plas plas plas plas plas plas plas plas
fernand0plas plas plas plas plas plas plas plas plas plas plas plas
fernand0plas plas plas plas plas plas plas plas plas plas plas plas
fernand0plas plas plas plas plas plas plas plas plas plas plas plas
fernand0plas plas plas plas plas plas plas plas plas plas plas plas
fernand0plas plas plas plas plas plas plas plas plas plas plas plas
damageCLAP CLAP CLAP CLAP CLAP CLAP CLAP CLAP CLAP
damageCLAP CLAP CLAP CLAP CLAP CLAP CLAP CLAP CLAP
damageCLAP CLAP CLAP CLAP CLAP CLAP CLAP CLAP CLAP
^ogro^bravo!!!!!!!
jaime^ogro^: Aviso #1 => Agradeceria mucho que no escribieras !!!!!!! otra
vez
fernand0plas plas plas plas plas plas plas plas plas plas plas plas
duckyclap clap clap clap clap clap clap clap
fernand0plas plas plas plas plas plas plas plas plas plas plas plas
fernand0plas plas plas plas plas plas plas plas plas plas plas plas
duckyclap clap clap clap clap clap clap clap
duckyclap clap clap clap clap clap clap clap
duckyclap clap clap clap clap clap clap clap
duckyclap clap clap clap clap clap clap clap
kroczjaiem endlog #linux
jjosePLAS PLAS PLAS
#linux
kroczjaime endlog #linux
jaimekrocz: Log cerrado!
kroczthanks to riel and all kernel hacker
roelindeed, thanks
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
> traslator are still reading :))

Generated by irclog2html.pl by Jeff Waugh - find it at freshmeat.net!

The Organizing Comittee

Email UsMore information


© 2004 - www.uninet.edu - Contact Organizing Comittee - Valid XHTML - Valid CSS - Based on a Design by Raul Pérez Justicia