[Info-vax] Reloading device drivers on x86-64 VMS
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Mon Mar 9 09:34:01 EDT 2015
On 2015-03-09 01:38:05 +0000, David Froble said:
> Some of these features being discussed are nice, and in some instances
> perhaps a bit helpful. Might as well have them, if possible.
>
> But for somebody running production (whatever that is) I don't see
> anything discussed so far as very meaningful.
>
> If you're working on device drivers, you sure aren't working on a
> production system. Not on any of mine anyway.
Driver debug, not near production. But then... I might then to ask
myself why these things crash, and why can't there be drivers that can
be debugged without the current and expected risk of operating system
crashes. Something akin to Mach — as was mentioned — might avoid some
of that, but then Mach has its own issues. Whether having gazillions
of cores might actually help with Mach? Alas, that's all fodder for
another day.
> If you want to install a new version of a sharable image, if it's
> compatible with the old version, what does it matter how long before
> the old version isn't used? If it isn't compatible, I think you got
> more to worry about than replacing a sharable image.
Some folks like the ability to unload and reload code, even when the
environment is stable. If you only ever load code, you're leaking
resources, and leaking eventually blows out some limit.
> A production system is (by my definition) a system running acceptable
> applications, and there is no reason for emergency updates. If you do
> have some required updates, they may require a new executable, or more.
> Seems to me that's already covered with current capabilities.
That's one view of production. For better and for worse, we're
increasingly headed toward continuous deployment, which is a mental
shift for many of us. That usually means a stream of updates arriving,
rather than big wads on longer schedules. Some production sites
already deploy multiple times each day, which can be a bit of a shock
to the upgrades-once-a-year devops crowd. VMS is getting
sort-of-monthly security upgrades mostly for OpenSSL, and this
situation is only going to speed up, particularly with security, but
also with other areas of software. (HP was using a form of continuous
software deployment with their features-via-patches approach, and I'd
be surprised if VSI doesn't at least consider incremental or continuous
deployments; rolling out features as they're ready, rather than sitting
on what's ready for months or longer.)
For some production environments, rolling out changes might mean that
reboots are feasible, either individual serves rebooting, or a rolling
reboot in a cluster configuration. Or it might mean that a rolling
process restart is necessary. For long-running processes that can't be
shut down — which is the "downside of uptime" problem — that's socket-
or RPC- or section-style interfaces to some hunk that can restart and
can reload the code, pending work to allow the process and the server
to be restarted with minimal or preferably with no service loss and no
data loss.
—————
[1] For those with Samba servers around:
<http://blog.trendmicro.com/trendlabs-security-intelligence/samba-remote-code-execution-vulnerability-cve-2015-0240/>
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list