Return-Path: Delivered-To: apmail-apr-dev-archive@www.apache.org Received: (qmail 29614 invoked from network); 16 Jul 2009 09:35:22 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 16 Jul 2009 09:35:22 -0000 Received: (qmail 54603 invoked by uid 500); 16 Jul 2009 09:36:27 -0000 Delivered-To: apmail-apr-dev-archive@apr.apache.org Received: (qmail 54510 invoked by uid 500); 16 Jul 2009 09:36:27 -0000 Mailing-List: contact dev-help@apr.apache.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Id: Delivered-To: mailing list dev@apr.apache.org Received: (qmail 54502 invoked by uid 99); 16 Jul 2009 09:36:27 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 16 Jul 2009 09:36:27 +0000 X-ASF-Spam-Status: No, hits=-0.5 required=10.0 tests=RCVD_IN_DNSWL_MED,SPF_HELO_PASS,SPF_PASS,URIBL_BLACK X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: domain of jorton@redhat.com designates 66.187.237.31 as permitted sender) Received: from [66.187.237.31] (HELO mx2.redhat.com) (66.187.237.31) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 16 Jul 2009 09:36:19 +0000 Received: from int-mx2.corp.redhat.com (int-mx2.corp.redhat.com [172.16.27.26]) by mx2.redhat.com (8.13.8/8.13.8) with ESMTP id n6G9ZwYi021309 for ; Thu, 16 Jul 2009 05:35:58 -0400 Received: from ns3.rdu.redhat.com (ns3.rdu.redhat.com [10.11.255.199]) by int-mx2.corp.redhat.com (8.13.1/8.13.1) with ESMTP id n6G9Zvml003813 for ; Thu, 16 Jul 2009 05:35:58 -0400 Received: from turnip.manyfish.co.uk (vpn-12-75.rdu.redhat.com [10.11.12.75]) by ns3.rdu.redhat.com (8.13.8/8.13.8) with ESMTP id n6G9Zueg019648 for ; Thu, 16 Jul 2009 05:35:57 -0400 Received: from jorton by turnip.manyfish.co.uk with local (Exim 4.69) (envelope-from ) id 1MRNNb-0002a0-Vt for dev@apr.apache.org; Thu, 16 Jul 2009 10:35:55 +0100 Date: Thu, 16 Jul 2009 10:35:55 +0100 From: Joe Orton To: dev@apr.apache.org Subject: Re: svn commit: r794485 - /apr/apr/trunk/configure.in Message-ID: <20090716093555.GA4093@redhat.com> Mail-Followup-To: dev@apr.apache.org References: <20090716013932.D629923888BB@eris.apache.org> <1247708572.2811.385.camel@shrek.rexursive.com> <20090716082739.GA5017@redhat.com> <1247735147.2811.422.camel@shrek.rexursive.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <1247735147.2811.422.camel@shrek.rexursive.com> User-Agent: Mutt/1.5.18 (2008-05-17) Organization: Red Hat UK Ltd, Amberley Place, 107-111 Peascod Street, Windsor, Berkshire, SL4 1TE, United Kingdom. Registered in UK and Wales under Company Registration No. 03798903 Directors: Michael Cunningham (USA), Brendan Lane (Ireland), Matt Parson (USA), Charlie Peters (USA) X-Scanned-By: MIMEDefang 2.58 on 172.16.27.26 X-Virus-Checked: Checked by ClamAV on apache.org On Thu, Jul 16, 2009 at 07:05:46PM +1000, Bojan Smojver wrote: > On Thu, 2009-07-16 at 09:27 +0100, Joe Orton wrote: > > In the past I have argued we should never do runtime platform feature > > detection, i.e., if accept4() works at build-time, we can presume it > > works at run-time. I think I need to soften that position now; use of > > a modern userspace on an older kernel seems to be very widespread in > > Xen hosting sites. I shipped socket(,SOCK_CLOEXEC) support in neon > > and got lots of complaints, from users across the spectrum of > > distributions. > > Shouldn't these people build their runtime using the older kernel then? The problem is that these Xen hosting sites use a specific guest kernel which they have tuned/customised/whatever. Then they let people run an otherwise vanilla Linux distribution on top of that. > It is bad enough that we need to do "will it really work" gymnastics at > build time. If we go down the road of runtime checks, we'll soon be > testing for all kinds of stuff, wasting lots of CPU cycles. I know, I totally agree. The only mitigation is that those who waste CPU cycles are those who run with mismatched kernel/userspace. It's the added complexity which scares me the most. Maybe let's just do a release with this code as-is, and see how many people complain, and then revisit the decision if necessary. > PS. This is obviously some kind of Xen bug (i.e. inability to run the > latest kernel). Shouldn't they be fixing it? I think this situation arose because of the historical lack of a stable hypervisor/guest interface for running paravirt. guests, which did get fixed more recently ("VMI"?), but, I'm not really an expert here, to say the least. Regards, Joe