• Re: %SYSTEM-F-ACCVIO again

    From motk@21:1/5 to motk on Sat Apr 6 19:50:54 2024
    On 6/04/2024 7:39 pm, motk wrote:

    Now I'll try and work out where dumpfiles go - I did turn on
    SYSTEM_CHECK and write it to CURRENT so hopefully it's there somewhere.

    Yeah, nah, nothing in SYS$SYSTEM:SYSDUMP.DMP.


    --
    motk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From motk@21:1/5 to Simon Clubley on Sat Apr 6 19:39:20 2024
    On 5/04/2024 11:20 pm, Simon Clubley wrote:

    Another idea: If this really is an executive mode failure, I wonder if setting BUGCHECKFATAL to 1 would be useful here ?

    Alex: What this would do is to turn the failure into a failure that
    crashes the system (and writes a dumpfile, assuming the VSI virtual
    image is setup correctly) instead of just deleting the current process.

    It would also mean anything in memory (including command history, etc)
    would be written to the dumpfile, so make sure there's nothing private
    in the memory of your system before performing more tests.

    What you could do then is to compress the dumpfile and send it to VSI privately via some means they give you.

    BTW, another idea: does x86-64 VMS currently write an entry into the
    errorlog on an executive mode bugcheck ? I wonder if it would be useful
    to check the errorlog to see if there is anything useful there from the previous failure ?

    Found some time today to try installing Apache, trying random
    half-remembered commands and looking through documentation that just
    talks about AXP and Integrity stuff, and lo:

    $ show proc

    Improperly handled condition, bad stack or no handler specified.
    Signal arguments: Number = 0000000000000005
    Name = 000000000000000C
    0000000000000004
    0000000000000878
    FFFF830007C02367
    0000000000000012
    Register dump:
    RAX = 000000007FF9DC80 RDI = 000000007FF9DC80 RSI = 0000000000000878
    RDX = 0000000000000000 RCX = 0000000000000878 R8 = 00000000FFFF8F81
    R9 = 000000000808080D RBX = 000000007FFABE00 RBP = 000000007FF9E540
    R10 = 000000007FFABDB0 R11 = 000000007FFA4D18 R12 = 000000007FF9C648
    R13 = 0000000000000018 R14 = 000000007FF9C800 R15 = 0000000000000201
    RIP = FFFF830007C02367 RSP = 000000007FF9E4E0 SS = 000000000000001B %SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual address=000000000000
    000C, PC=0000000000000002, PS=7AD82CC6

    Improperly handled condition, bad stack or no handler specified.
    Signal arguments: Number = 0000000000000005
    Name = 000000000000000C
    0000000000000000
    8000000000000000
    000000007AE15900
    0000000000000012
    Register dump:
    RAX = 0000000000000001 RDI = FFFFFFFF77761C88 RSI = 0000000002040001
    RDX = 0000000000000000 RCX = FFFFFFFF8AC09B5E R8 = 000000007ACBD11F
    R9 = 0000000000000106 RBX = 000000007FFABE00 RBP = 000000007FF9D608
    R10 = 000000007FFA4D18 R11 = 000000007FFA4D18 R12 = 000000007FF9D5C0
    R13 = 000000007FFCDCAC R14 = 0000000000000002 R15 = 0000000045178301 Connection closed by foreign host.000000007FF9CA28 SS = 000000000000001B

    Now I'll try and work out where dumpfiles go - I did turn on
    SYSTEM_CHECK and write it to CURRENT so hopefully it's there somewhere.

    Simon.

    PS: pointed message to VSI management: A hobbyist has just appeared to
    find a process-deleting bug within VMS that your testing has missed so far. _This_ is an example of why the hobbyist program is important, and of benefit, to you.

    Yeah, noobs do non-obvious stuff and find weird edge cases.
    --
    motk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From motk@21:1/5 to All on Mon Apr 8 11:36:26 2024
    On 4/6/24 19:50, motk wrote:

    Everything is going great.

    $ help analyze

    Improperly handled condition, bad stack or no handler specified.
    Signal arguments: Number = 0000000000000005
    Name = 000000000000000C
    0000000000000004
    00000000000007D8
    FFFF830007C02367
    0000000000000012
    Register dump:
    RAX = 000000007FF9DC80 RDI = 000000007FF9DC80 RSI = 00000000000007D8
    RDX = 0000000000000000 RCX = 00000000000007D8 R8 = 00000000FFFF8F84
    R9 = 000000000808080D RBX = 000000007FFABE00 RBP = 000000007FF9E4A0
    R10 = 000000007FFABDB0 R11 = 000000007FFA4D18 R12 = 000000007FF9C648
    R13 = 0000000000000018 R14 = 000000007FF9C800 R15 = 0000000000008301
    RIP = FFFF830007C02367 RSP = 000000007FF9E440 SS = 000000000000001B %SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual address=000000000000000C, PC=0000000000000002, PS=7AD44D2F

    Improperly handled condition, bad stack or no handler specified.
    Signal arguments: Number = 0000000000000005
    Name = 000000000000000C
    0000000000000014
    0000000000000000
    0000000000000000
    0000000000000012
    Register dump:
    RAX = 0000000000000001 RDI = FFFFFFFF776521E8 RSI = 00000000020C0001
    RDX = 0000000000000000 RCX = FFFFFFFF8AC09B5E R8 = 000000007ACBD11F
    R9 = 0000000004000106 RBX = 000000007FFABE00 RBP = 000000007FF9D568
    R10 = 000000007FFA4D18 R11 = 000000007FFA4D18 R12 = 000000007FF9D520
    R13 = 000000007FFCDCAC R14 = 0000000000000002 R15 = 000000004B9E8301 Connection to 192.168.188.121 closed.000007FF9CA30 SS = 000000000000001B


    --
    motk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From motk@21:1/5 to All on Mon Apr 8 12:30:33 2024
    On 4/8/24 12:20, Arne Vajhøj wrote:

    I consider it more likely that VMS and the CPU/virtual memory
    environment your VM provide disagree on something causing
    random sporadic memory related errors.

    It seems odd, I agree. This was running on an intel nuc with a 12th gen
    i5 cpu, and I wonder if openvms doesn't like straddling P/E cores.

    I've previously done some memory burn-in on that node without issues.

    I've migrated it over to a plain 6th gen node with 4 boring cores; lets
    see if that improves things.

    Arne

    --
    motk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to motk on Sun Apr 7 22:20:42 2024
    On 4/7/2024 9:36 PM, motk wrote:
    $ help analyze

      Improperly handled condition, bad stack or no handler specified.
        Signal arguments:   Number = 0000000000000005
                            Name   = 000000000000000C
                                     0000000000000004
                                     00000000000007D8
                                     FFFF830007C02367
                                     0000000000000012
        Register dump:
        RAX = 000000007FF9DC80  RDI = 000000007FF9DC80  RSI = 00000000000007D8
        RDX = 0000000000000000  RCX = 00000000000007D8  R8  = 00000000FFFF8F84
        R9  = 000000000808080D  RBX = 000000007FFABE00  RBP = 000000007FF9E4A0
        R10 = 000000007FFABDB0  R11 = 000000007FFA4D18  R12 = 000000007FF9C648
        R13 = 0000000000000018  R14 = 000000007FF9C800  R15 = 0000000000008301
        RIP = FFFF830007C02367  RSP = 000000007FF9E440  SS  = 000000000000001B
    %SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual address=000000000000000C, PC=0000000000000002, PS=7AD44D2F

      Improperly handled condition, bad stack or no handler specified.
        Signal arguments:   Number = 0000000000000005
                            Name   = 000000000000000C
                                     0000000000000014
                                     0000000000000000
                                     0000000000000000
                                     0000000000000012
        Register dump:
        RAX = 0000000000000001  RDI = FFFFFFFF776521E8  RSI = 00000000020C0001
        RDX = 0000000000000000  RCX = FFFFFFFF8AC09B5E  R8  = 000000007ACBD11F
        R9  = 0000000004000106  RBX = 000000007FFABE00  RBP = 000000007FF9D568
        R10 = 000000007FFA4D18  R11 = 000000007FFA4D18  R12 = 000000007FF9D520
        R13 = 000000007FFCDCAC  R14 = 0000000000000002  R15 = 000000004B9E8301
    Connection to 192.168.188.121 closed.000007FF9CA30  SS  = 000000000000001B

    I am getting the idea that VMS does not like your VM.

    It seems unlikely to me that:

    $ product list *
    $ help analyze

    trigger some x86-64 specific DCL or RMS bug that nobody else has
    encountered.

    I consider it more likely that VMS and the CPU/virtual memory
    environment your VM provide disagree on something causing
    random sporadic memory related errors.

    But then this stuff is way outside of my expertise area
    so I am probably wrong.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to motk on Mon Apr 8 12:27:53 2024
    On 2024-04-07, motk <yep@yep.yep> wrote:
    On 4/6/24 19:50, motk wrote:

    Everything is going great.

    $ help analyze

    Improperly handled condition, bad stack or no handler specified.
    Signal arguments: Number = 0000000000000005
    Name = 000000000000000C
    0000000000000004
    00000000000007D8
    FFFF830007C02367
    0000000000000012
    Register dump:
    RAX = 000000007FF9DC80 RDI = 000000007FF9DC80 RSI = 00000000000007D8
    RDX = 0000000000000000 RCX = 00000000000007D8 R8 = 00000000FFFF8F84
    R9 = 000000000808080D RBX = 000000007FFABE00 RBP = 000000007FF9E4A0
    R10 = 000000007FFABDB0 R11 = 000000007FFA4D18 R12 = 000000007FF9C648
    R13 = 0000000000000018 R14 = 000000007FF9C800 R15 = 0000000000008301
    RIP = FFFF830007C02367 RSP = 000000007FF9E440 SS = 000000000000001B %SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual address=000000000000000C, PC=0000000000000002, PS=7AD44D2F


    Executive mode again (_if_ I am reading the PS register correctly and if
    the current mode bits are in the same place as on Alpha.)

    I wonder if RMS (or the XQP) has managed to corrupt your disk somehow.

    Can you make the system disk available to a second instance and run an
    $ anal/disk on it from that second instance ?

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to motk on Mon Apr 8 12:34:44 2024
    On 2024-04-07, motk <yep@yep.yep> wrote:
    On 4/8/24 12:20, Arne Vajhj wrote:

    I consider it more likely that VMS and the CPU/virtual memory
    environment your VM provide disagree on something causing
    random sporadic memory related errors.

    It seems odd, I agree. This was running on an intel nuc with a 12th gen
    i5 cpu, and I wonder if openvms doesn't like straddling P/E cores.

    I've previously done some memory burn-in on that node without issues.

    I've migrated it over to a plain 6th gen node with 4 boring cores; lets
    see if that improves things.


    It's still a VMS bug (even if VMS is being _way_ too fragile) IMHO.

    IIRC, motk is using proxmox, which many other people are using just fine
    to run other operating systems.

    If there's something VMS needs or a configuration it doesn't support,
    then that should be probed at boot time and VMS should refuse to continue booting with the reason why been made clear. The bug in this case is that
    this check is missing from VMS.

    The other possibility is that VMS is _supposed_ to work OK in this configuration, but this specific VM setup has been untested by VSI until
    now. That means there is a bug in the VMS code itself which needs fixing.

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to motk on Mon Apr 8 12:22:40 2024
    On 2024-04-06, motk <meh@meh.meh> wrote:
    On 6/04/2024 7:39 pm, motk wrote:

    Now I'll try and work out where dumpfiles go - I did turn on
    SYSTEM_CHECK and write it to CURRENT so hopefully it's there somewhere.

    Yeah, nah, nothing in SYS$SYSTEM:SYSDUMP.DMP.


    It could be in the pagefile (or VSI may have disabled dumps on this
    image they are now shipping.)

    Here is a writeup from the VSI Wiki you should find useful and which
    will guide you through the various possibilities:

    https://wiki.vmssoftware.com/Dump_File

    BTW, I am surprised by the lack of answers to this question over the
    weekend before I got to see it just now. In the old days, there would
    have been a lot of answers to your question (and to my other technical questions) by now. People still complain about the off-topic stuff, but
    when there's a series of good technical questions, there are no longer
    any answers to them.

    I wonder if the VMS online community has finally collapsed and there
    are only a few people left.

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Craig A. Berry@21:1/5 to motk on Mon Apr 8 07:18:40 2024
    On 4/7/24 9:30 PM, motk wrote:
    On 4/8/24 12:20, Arne Vajhøj wrote:

    I consider it more likely that VMS and the CPU/virtual memory
    environment your VM provide disagree on something causing
    random sporadic memory related errors.

    It seems odd, I agree. This was running on an intel nuc with a 12th gen
    i5 cpu, and I wonder if openvms doesn't like straddling P/E cores.

    I've previously done some memory burn-in on that node without issues.

    I've migrated it over to a plain 6th gen node with 4 boring cores; lets
    see if that improves things.

    I don't think 6th gen is supported is it? In any case, check your
    host(s) with the Python script here:

    https://vmssoftware.com/openkits/alpopensource/vmscheck.zip

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Robert A. Brooks@21:1/5 to Simon Clubley on Mon Apr 8 12:49:23 2024
    On 4/8/2024 8:34 AM, Simon Clubley wrote:

    If there's something VMS needs or a configuration it doesn't support,
    then that should be probed at boot time and VMS should refuse to continue booting with the reason why been made clear. The bug in this case is that this check is missing from VMS.

    That's one way to look at it.

    Another way is that we have been quite clear what the requirements are to run VMS.

    Any variation from that is unsupported. We recognize that there are likely configurations
    that are technically unsupported, but will still likely work. Preventing those configurations from working is someething we could do, but chose not to.

    The other possibility is that VMS is _supposed_ to work OK in this configuration, but this specific VM setup has been untested by VSI until
    now. That means there is a bug in the VMS code itself which needs fixing.

    We are not claiming support for Proxmox, although that testing has begun.
    Given that it is a KVM-based hypervisor, getting it fully supported should not be difficult, but we're not there yet.

    It is for these reasons that we've been quite conservative about what is supported.

    We are interested in any feedback we get, but that doesn't mean we're going to respond to every
    problem immediately when it's an unsupported configuration.

    --
    -- Rob

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to Simon Clubley on Mon Apr 8 17:32:05 2024
    On 2024-04-08, Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote:
    On 2024-04-08, Robert A. Brooks <FIRST.LAST@vmssoftware.com> wrote:
    On 4/8/2024 8:34 AM, Simon Clubley wrote:

    If there's something VMS needs or a configuration it doesn't support,
    then that should be probed at boot time and VMS should refuse to continue >>> booting with the reason why been made clear. The bug in this case is that >>> this check is missing from VMS.

    That's one way to look at it.

    Another way is that we have been quite clear what the requirements are to run VMS.

    Any variation from that is unsupported. We recognize that there are likely configurations
    that are technically unsupported, but will still likely work. Preventing those
    configurations from working is someething we could do, but chose not to.


    Given that the VMS mindset is supposed to be one of robustness and reliability, perhaps the proper approach is to enforce a default refuse
    to boot on unsupposed configuration, but allow an override with a boot

    s/unsupposed/unsupported/

    Oops. :-)

    flag or SYSGEN parameter.

    That way, people don't accidentally use an unsupported configuration in production use, but you also don't stop people from using an unsupported configuration if they choose to do so.

    However, if you implement this, an impossible to miss message should be output on every boot so that the flag is not set and then forgotten about.


    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to Robert A. Brooks on Mon Apr 8 17:30:15 2024
    On 2024-04-08, Robert A. Brooks <FIRST.LAST@vmssoftware.com> wrote:
    On 4/8/2024 8:34 AM, Simon Clubley wrote:

    If there's something VMS needs or a configuration it doesn't support,
    then that should be probed at boot time and VMS should refuse to continue
    booting with the reason why been made clear. The bug in this case is that
    this check is missing from VMS.

    That's one way to look at it.

    Another way is that we have been quite clear what the requirements are to run VMS.

    Any variation from that is unsupported. We recognize that there are likely configurations
    that are technically unsupported, but will still likely work. Preventing those
    configurations from working is someething we could do, but chose not to.


    Given that the VMS mindset is supposed to be one of robustness and
    reliability, perhaps the proper approach is to enforce a default refuse
    to boot on unsupposed configuration, but allow an override with a boot
    flag or SYSGEN parameter.

    That way, people don't accidentally use an unsupported configuration in production use, but you also don't stop people from using an unsupported configuration if they choose to do so.

    However, if you implement this, an impossible to miss message should be
    output on every boot so that the flag is not set and then forgotten about.

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From motk@21:1/5 to Craig A. Berry on Tue Apr 9 10:05:59 2024
    On 4/8/24 22:18, Craig A. Berry wrote:

    I don't think 6th gen is supported is it?  In any case, check your
    host(s) with the Python script here:

    Depends on what you mean by 'supported', unless there's some very odd
    microcode or msr setup that needs to be done so long as it meets cpu
    criteria, it should Just Work. We're in an age of commodity COTS
    hardware now.

    https://vmssoftware.com/openkits/alpopensource/vmscheck.zip

    All my hardware checks out using the vmscheck.py script.

    --
    motk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From motk@21:1/5 to Simon Clubley on Tue Apr 9 10:23:28 2024
    On 4/8/24 22:27, Simon Clubley wrote:

    [ ... ]

    n (_if_ I am reading the PS register correctly and if
    the current mode bits are in the same place as on Alpha.)

    I wonder if RMS (or the XQP) has managed to corrupt your disk somehow.

    Can you make the system disk available to a second instance and run an
    $ anal/disk on it from that second instance ?

    Sounds like a plan, I'll give it a go.

    --
    motk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to motk on Tue Apr 9 00:18:10 2024
    On Tue, 9 Apr 2024 10:05:59 +1000, motk wrote:

    We're in an age of commodity COTS hardware now.

    Remember that x86 is not exactly an “open standard”--it is very much controlled by proprietary vendors who never cease their search for that vendor-lock-in edge.

    Just because you have been pampered by the ongoing efforts of OS
    developers in the Linux community and elsewhere to ensure that things
    “just work” doesn’t mean it’s something you can take for granted.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From motk@21:1/5 to Lawrence D'Oliveiro on Tue Apr 9 10:31:16 2024
    On 4/9/24 10:18, Lawrence D'Oliveiro wrote:

    Remember that x86 is not exactly an “open standard”--it is very much controlled by proprietary vendors who never cease their search for that vendor-lock-in edge.

    Just because you have been pampered by the ongoing efforts of OS
    developers in the Linux community and elsewhere to ensure that things
    “just work” doesn’t mean it’s something you can take for granted.

    Yeah, good point. That said, even if it's not an open standard with a
    fixed system architecture, you have things like the x86-64 cpu
    micro-arch feature levels to work with, eg https://gcc.gnu.org/onlinedocs/gcc/x86-Options.html. Making the
    supported versions narrow enough to not burden development but not so
    narrow that it discourages use and therefore discovering interesting
    bugs isn't an easy job.

    --
    motk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Robert A. Brooks on Mon Apr 8 21:00:26 2024
    On 4/8/2024 12:49 PM, Robert A. Brooks wrote:
    On 4/8/2024 8:34 AM, Simon Clubley wrote:
    If there's something VMS needs or a configuration it doesn't support,
    then that should be probed at boot time and VMS should refuse to continue
    booting with the reason why been made clear. The bug in this case is that
    this check is missing from VMS.

    That's one way to look at it.

    Another way is that we have been quite clear what the requirements are
    to run VMS.

    Any variation from that is unsupported.  We recognize that there are
    likely configurations
    that are technically unsupported, but will still likely work.
    Preventing those
    configurations from working is someething we could do, but chose not to.

    The other possibility is that VMS is _supposed_ to work OK in this
    configuration, but this specific VM setup has been untested by VSI until
    now. That means there is a bug in the VMS code itself which needs fixing.

    We are not claiming support for Proxmox, although that testing has begun. Given that it is a KVM-based hypervisor, getting it fully supported
    should not
    be difficult, but we're not there yet.

    It is for these reasons that we've been quite conservative about what is supported.

    We are interested in any feedback we get, but that doesn't mean we're
    going to respond to every
    problem immediately when it's an unsupported configuration.

    I think the current practice makes sense.

    It should be obvious that running an unsupported configuration
    comes with a risk of problems.

    It makes sense to have VMS complain about configs that are
    known not to work.

    But I think it would be very problematic with VMS complaining
    over configs that are not known to work.

    Because removing that test would require a release.

    We would see:

    ...
    VMS 9.2-2H41 - added support for VM Foo 17 and VM Bar 3
    VMS 9.2-2H42 - added support for VM Bar 4 and VM FooBar 7
    ..

    No thanks.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to All on Tue Apr 9 01:43:20 2024
    On Mon, 8 Apr 2024 21:00:26 -0400, Arne Vajhøj wrote:

    Because removing that test would require a release.

    You don’t have the concept of “volatile” package updates? Like the timezone database, which changes several times a year?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From motk@21:1/5 to Lawrence D'Oliveiro on Tue Apr 9 15:35:07 2024
    On 9/4/24 11:43, Lawrence D'Oliveiro wrote:
    You don’t have the concept of “volatile” package updates? Like the timezone database, which changes several times a year?

    It sounds like it's going to be a yearly build and then thrown over the
    fence? Surely not.

    --
    motk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From motk@21:1/5 to Robert A. Brooks on Tue Apr 9 15:31:36 2024
    On 9/4/24 02:49, Robert A. Brooks wrote:

    We are not claiming support for Proxmox, although that testing has begun. Given that it is a KVM-based hypervisor, getting it fully supported
    should not
    be difficult, but we're not there yet.

    It's basically vanilla kvm-qemu. People aren't trying to run it in
    nested emulators on an FPGA or anything.

    --
    motk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to arne@vajhoej.dk on Tue Apr 9 12:45:44 2024
    On 2024-04-08, Arne Vajhj <arne@vajhoej.dk> wrote:

    But I think it would be very problematic with VMS complaining
    over configs that are not known to work.

    Because removing that test would require a release.

    We would see:

    ...
    VMS 9.2-2H41 - added support for VM Foo 17 and VM Bar 3
    VMS 9.2-2H42 - added support for VM Bar 4 and VM FooBar 7
    ..

    No thanks.


    It does not have to be a release - it could be a patch. It is also
    absolutely no different from in the past when a new version of VMS
    used to add support for new CPUs from DEC.

    IOW, my suggested approach is a very long-established part of the
    VMS world. The only difference now is that VMS would be allowed to
    continue booting if you set an override flag or SYSGEN parameter.

    Also, there should be no need to add support for "VM Bar 4" unless
    it brought new functionality over "VM Bar 3" that you wanted to
    support in VMS.

    VMS is used in mission-critical production environments. You should
    not be allowed to accidentally boot into an unsupported configuration
    without being made _VERY_ aware of that fact.

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to motk on Tue Apr 9 12:47:37 2024
    On 2024-04-09, motk <yep@yep.yep> wrote:
    On 9/4/24 02:49, Robert A. Brooks wrote:

    We are not claiming support for Proxmox, although that testing has begun.
    Given that it is a KVM-based hypervisor, getting it fully supported
    should not
    be difficult, but we're not there yet.

    It's basically vanilla kvm-qemu. People aren't trying to run it in
    nested emulators on an FPGA or anything.


    That's what makes the dramatic failure you are seeing even more surprising.

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Simon Clubley on Tue Apr 9 15:23:33 2024
    On 4/9/2024 8:45 AM, Simon Clubley wrote:
    On 2024-04-08, Arne Vajhøj <arne@vajhoej.dk> wrote:
    But I think it would be very problematic with VMS complaining
    over configs that are not known to work.

    Because removing that test would require a release.

    We would see:

    ...
    VMS 9.2-2H41 - added support for VM Foo 17 and VM Bar 3
    VMS 9.2-2H42 - added support for VM Bar 4 and VM FooBar 7
    ..

    No thanks.

    It does not have to be a release - it could be a patch.

    True.

    But I don't like:
    ...
    VMS 9.2-2 with HW patch 41
    VMS 9.2-2 with HW patch 42
    ...

    either.

    It is also absolutely no different from in the past when a new version of VMS
    used to add support for new CPUs from DEC.

    Correct. This is the mechanism used in the past.

    But the context has changed. Instead of DEC releasing a few new
    models every year, then we have an huge number of VM, VM version,
    host, host version combos.

    H1..H4 is fine. H1..H100 is a problem.

    IOW, my suggested approach is a very long-established part of the
    VMS world. The only difference now is that VMS would be allowed to
    continue booting if you set an override flag or SYSGEN parameter.

    Also, there should be no need to add support for "VM Bar 4" unless
    it brought new functionality over "VM Bar 3" that you wanted to
    support in VMS.

    ????

    The interest in different VM's is not driven by what VMS need,
    but from what customers want.

    VMS is used in mission-critical production environments. You should
    not be allowed to accidentally boot into an unsupported configuration
    without being made _VERY_ aware of that fact.

    Hopefully those running a mission critical production environment
    on VMS read about supported configs before moving production to
    that config and never runs it in anything accidentally
    booted.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dave Froble@21:1/5 to Simon Clubley on Tue Apr 9 20:51:36 2024
    On 4/9/2024 8:45 AM, Simon Clubley wrote:
    On 2024-04-08, Arne Vajhøj <arne@vajhoej.dk> wrote:

    But I think it would be very problematic with VMS complaining
    over configs that are not known to work.

    Because removing that test would require a release.

    We would see:

    ...
    VMS 9.2-2H41 - added support for VM Foo 17 and VM Bar 3
    VMS 9.2-2H42 - added support for VM Bar 4 and VM FooBar 7
    ..

    No thanks.


    It does not have to be a release - it could be a patch. It is also
    absolutely no different from in the past when a new version of VMS
    used to add support for new CPUs from DEC.

    IOW, my suggested approach is a very long-established part of the
    VMS world. The only difference now is that VMS would be allowed to
    continue booting if you set an override flag or SYSGEN parameter.

    Also, there should be no need to add support for "VM Bar 4" unless
    it brought new functionality over "VM Bar 3" that you wanted to
    support in VMS.

    VMS is used in mission-critical production environments. You should
    not be allowed to accidentally boot into an unsupported configuration
    without being made _VERY_ aware of that fact.

    Simon.


    But hasn't the discussion been about the CL stuff? I don't think CL and mission
    critical co-exist. I'm sure VSI doesn't think that.

    As for due diligence, when did that go away? Any reasonable customer would check, and re-check, that they are using supported stuff.

    --
    David Froble Tel: 724-529-0450
    Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
    DFE Ultralights, Inc.
    170 Grimplin Road
    Vanderbilt, PA 15486

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dave Froble@21:1/5 to motk on Tue Apr 9 20:48:01 2024
    On 4/9/2024 1:35 AM, motk wrote:
    On 9/4/24 11:43, Lawrence D'Oliveiro wrote:
    You don’t have the concept of “volatile” package updates? Like the
    timezone database, which changes several times a year?

    It sounds like it's going to be a yearly build and then thrown over the fence?
    Surely not.


    In the interest of disapproving the use of assumptions (ASS U ME), I'd guess nobody yet knows what is going to happen. Perhaps even VSI!

    --
    David Froble Tel: 724-529-0450
    Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
    DFE Ultralights, Inc.
    170 Grimplin Road
    Vanderbilt, PA 15486

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From motk@21:1/5 to Dave Froble on Wed Apr 10 11:55:09 2024
    On 10/4/24 10:48, Dave Froble wrote:

    In the interest of disapproving the use of assumptions (ASS U ME), I'd
    guess nobody yet knows what is going to happen.  Perhaps even VSI!

    If the latter, that'd be a worry! Hard to tell though, not a lot of communication happening.

    --
    motk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From motk@21:1/5 to All on Wed Apr 10 12:28:32 2024
    On 9/4/24 11:00, Arne Vajhøj wrote:

    We would see:>
    ...
    VMS 9.2-2H41 - added support for VM Foo 17 and VM Bar 3
    VMS 9.2-2H42 - added support for VM Bar 4 and VM FooBar 7

    Just looking at the supported hardware/virtualization environments on https://vmssoftware.com/about/v92/ and noting a couple of things:

    There's no actual 'supported' list, only 'tested'.
    The latest tested QEMU version is 5.2.0, from 2020.
    The list of 'tested' virt environments is pretty baroque and I wonder
    how it's tested.

    No thanks.

    In practical terms, you're already there. That's the reality of COTS visualization. You can probably make a good case for requiring proper
    ECC RAM and so on so long as you don't handwave away bug reports.

    Arne

    --
    motk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to arne@vajhoej.dk on Wed Apr 10 12:10:53 2024
    On 2024-04-09, Arne Vajhj <arne@vajhoej.dk> wrote:
    On 4/9/2024 8:45 AM, Simon Clubley wrote:
    On 2024-04-08, Arne Vajhj <arne@vajhoej.dk> wrote:
    But I think it would be very problematic with VMS complaining
    over configs that are not known to work.

    Because removing that test would require a release.

    We would see:

    ...
    VMS 9.2-2H41 - added support for VM Foo 17 and VM Bar 3
    VMS 9.2-2H42 - added support for VM Bar 4 and VM FooBar 7
    ..

    No thanks.

    It does not have to be a release - it could be a patch.

    True.

    But I don't like:
    ...
    VMS 9.2-2 with HW patch 41
    VMS 9.2-2 with HW patch 42
    ...

    either.


    How many VM solutions do you think there are out there ? :-)

    Hint: there isn't 41 of them. :-)

    IOW, my suggested approach is a very long-established part of the
    VMS world. The only difference now is that VMS would be allowed to
    continue booting if you set an override flag or SYSGEN parameter.

    Also, there should be no need to add support for "VM Bar 4" unless
    it brought new functionality over "VM Bar 3" that you wanted to
    support in VMS.

    ????

    The interest in different VM's is not driven by what VMS need,
    but from what customers want.


    What customers need is implemented by turning it into what VMS needs...

    VMS is used in mission-critical production environments. You should
    not be allowed to accidentally boot into an unsupported configuration
    without being made _VERY_ aware of that fact.

    Hopefully those running a mission critical production environment
    on VMS read about supported configs before moving production to
    that config and never runs it in anything accidentally
    booted.


    According to some people: "There is no need for anything more safer than
    the C or C++ programming language. You just have to be careful when writing your code...". Your comment above is from the same incorrect mindset.

    In the real world, people make mistakes, especially in an outsourced environment where people cost, not people capability, is the driving
    factor and hence people are not as skilled with VMS as they could be.

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to Dave Froble on Wed Apr 10 12:12:32 2024
    On 2024-04-09, Dave Froble <davef@tsoft-inc.com> wrote:

    But hasn't the discussion been about the CL stuff? I don't think CL and mission
    critical co-exist. I'm sure VSI doesn't think that.


    No. This is about adding checks to VMS itself.

    As for due diligence, when did that go away? Any reasonable customer would check, and re-check, that they are using supported stuff.


    People make mistakes. See my reply to Arne.

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to motk on Wed Apr 10 12:21:47 2024
    On 2024-04-09, motk <yep@yep.yep> wrote:
    On 9/4/24 11:00, Arne Vajhj wrote:

    We would see:>
    ...
    VMS 9.2-2H41 - added support for VM Foo 17 and VM Bar 3
    VMS 9.2-2H42 - added support for VM Bar 4 and VM FooBar 7

    Just looking at the supported hardware/virtualization environments on https://vmssoftware.com/about/v92/ and noting a couple of things:

    There's no actual 'supported' list, only 'tested'.
    The latest tested QEMU version is 5.2.0, from 2020.
    The list of 'tested' virt environments is pretty baroque and I wonder
    how it's tested.


    Interesting. What is worrying from that page is that a recent version
    of some VMware products causes VMS to fail during boot. I would really
    like to know why that is as this is not something I would have expected
    to see.

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Simon Clubley on Wed Apr 10 09:45:45 2024
    On 4/10/2024 8:10 AM, Simon Clubley wrote:
    On 2024-04-09, Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 4/9/2024 8:45 AM, Simon Clubley wrote:
    On 2024-04-08, Arne Vajhøj <arne@vajhoej.dk> wrote:
    But I think it would be very problematic with VMS complaining
    over configs that are not known to work.

    Because removing that test would require a release.

    We would see:

    ...
    VMS 9.2-2H41 - added support for VM Foo 17 and VM Bar 3
    VMS 9.2-2H42 - added support for VM Bar 4 and VM FooBar 7
    ..

    No thanks.

    It does not have to be a release - it could be a patch.

    True.

    But I don't like:
    ...
    VMS 9.2-2 with HW patch 41
    VMS 9.2-2 with HW patch 42
    ...

    either.


    How many VM solutions do you think there are out there ? :-)

    Hint: there isn't 41 of them. :-)

    Considering versions - yes there are.

    And adding host and versions of that we will probably pass 410.

    VMS is used in mission-critical production environments. You should
    not be allowed to accidentally boot into an unsupported configuration
    without being made _VERY_ aware of that fact.

    Hopefully those running a mission critical production environment
    on VMS read about supported configs before moving production to
    that config and never runs it in anything accidentally
    booted.


    According to some people: "There is no need for anything more safer than
    the C or C++ programming language. You just have to be careful when writing your code...". Your comment above is from the same incorrect mindset.

    In the real world, people make mistakes, especially in an outsourced environment where people cost, not people capability, is the driving
    factor and hence people are not as skilled with VMS as they could be.

    People makes mistakes. Especially when it is easy to to make
    mistakes.

    Bringing the mission critical production VM down.
    Accidentally install an unsupported VM in production environment.
    Accidentally copy the production environment from the supported
    VM to the unsupported VM. Accidentally bring up on the unsupported VM.
    Is not a mistake, but a series of mistakes. It is not a seconds/minutes
    mess up, but hours/days mess up.

    It is good to protect against mistakes, but at some point one need
    to stop.

    What is the plan to prevent people with privs from by mistake to do:

    $ DEL SYS$COMMON:[000000...]*.*;*

    ?

    There is no plan. And I don't think we need a plan for that.

    I don't think these weird examples are equivalent to people
    messing up array indexes in languages not checking those.

    These weird examples are the equivalent of the language
    enabling checks by default and allowing developers to
    bypass checks by putting an unsafe {} block around it and
    then having the developer mistakenly put unsafe {}
    around some code where it should not have been.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dave Froble@21:1/5 to All on Wed Apr 10 10:15:09 2024
    On 4/10/2024 9:45 AM, Arne Vajhøj wrote:

    What is the plan to prevent people with privs from by mistake to do:

    $ DEL SYS$COMMON:[000000...]*.*;*

    Well, since similar has already happened ...

    $ De [*...]*.*;*

    :-)

    I'd guess nothing would stop that.

    And it didn't ...

    --
    David Froble Tel: 724-529-0450
    Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
    DFE Ultralights, Inc.
    170 Grimplin Road
    Vanderbilt, PA 15486

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dave Froble@21:1/5 to Simon Clubley on Wed Apr 10 10:17:15 2024
    On 4/10/2024 8:12 AM, Simon Clubley wrote:
    On 2024-04-09, Dave Froble <davef@tsoft-inc.com> wrote:

    But hasn't the discussion been about the CL stuff? I don't think CL and mission
    critical co-exist. I'm sure VSI doesn't think that.


    No. This is about adding checks to VMS itself.

    As for due diligence, when did that go away? Any reasonable customer would >> check, and re-check, that they are using supported stuff.


    People make mistakes. See my reply to Arne.

    And they pay for them, and hopefully learn from them.

    You cannot protect from everything.


    --
    David Froble Tel: 724-529-0450
    Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
    DFE Ultralights, Inc.
    170 Grimplin Road
    Vanderbilt, PA 15486

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to arne@vajhoej.dk on Wed Apr 10 17:21:11 2024
    On 2024-04-10, Arne Vajhj <arne@vajhoej.dk> wrote:
    On 4/10/2024 8:10 AM, Simon Clubley wrote:

    How many VM solutions do you think there are out there ? :-)

    Hint: there isn't 41 of them. :-)

    Considering versions - yes there are.

    And adding host and versions of that we will probably pass 410.


    Why would you need a new version of VMS whenever a new point release
    of the host VM software is released ? The whole point of a VM is to
    isolate the OS running under the VM from the underlying hardware/OS.

    You test that the VM software is compatible with VMS and then assume
    that all future point releases are also compatible. That's the whole
    point of a VM.

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Hans Bachner@21:1/5 to Robert A. Brooks on Thu Apr 11 12:39:49 2024
    Robert A. Brooks schrieb am 08.04.2024 um 18:49:
    On 4/8/2024 8:34 AM, Simon Clubley wrote:

    If there's something VMS needs or a configuration it doesn't support,
    then that should be probed at boot time and VMS should refuse to continue
    booting with the reason why been made clear. The bug in this case is that
    this check is missing from VMS.

    That's one way to look at it.

    Another way is that we have been quite clear what the requirements are
    to run VMS.

    Any variation from that is unsupported.  We recognize that there are
    likely configurations
    that are technically unsupported, but will still likely work.
    Preventing those
    configurations from working is someething we could do, but chose not to.

    The other possibility is that VMS is _supposed_ to work OK in this
    configuration, but this specific VM setup has been untested by VSI until
    now. That means there is a bug in the VMS code itself which needs fixing.

    We are not claiming support for Proxmox, although that testing has begun. Given that it is a KVM-based hypervisor, getting it fully supported
    should not
    be difficult, but we're not there yet.

    It is for these reasons that we've been quite conservative about what is supported.

    We are interested in any feedback we get, but that doesn't mean we're
    going to respond to every
    problem immediately when it's an unsupported configuration.

    At the Connect IT Symposium, Thilo Lauer (VSI) yesterday gave an
    introduction to Proxmox and demoed an OpenVMS instance running under
    Proxmox. Camiel Vanderhoeven also mentioned that official support for
    Proxmox as a hypervisor is relatively high on their list, especially due
    to the changes at VMware since the takeover by Broadcom.

    So - stay tuned...

    Hans.

    PS: Camiel has been appointed "Chief Architect and Strategist" at VSI
    recently. In his new role, he will relief Clair Grant from some of his responsibilities.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Hans Bachner on Thu Apr 11 14:57:13 2024
    On 4/11/2024 6:39 AM, Hans Bachner wrote:
    PS: Camiel has been appointed "Chief Architect and Strategist" at VSI recently. In his new role, he will relief Clair Grant from some of his responsibilities.

    So he will be the key person for the discussion about what
    happen to VMS *after* the x86-64 migration.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to hans@bachner.priv.at on Fri Apr 12 02:28:14 2024
    In article <uv8elm$1l1r1$1@dont-email.me>,
    Hans Bachner <hans@bachner.priv.at> wrote:
    Robert A. Brooks schrieb am 08.04.2024 um 18:49:
    On 4/8/2024 8:34 AM, Simon Clubley wrote:

    If there's something VMS needs or a configuration it doesn't support,
    then that should be probed at boot time and VMS should refuse to continue >>> booting with the reason why been made clear. The bug in this case is that >>> this check is missing from VMS.

    That's one way to look at it.

    Another way is that we have been quite clear what the requirements are
    to run VMS.

    Any variation from that is unsupported.  We recognize that there are
    likely configurations
    that are technically unsupported, but will still likely work.
    Preventing those
    configurations from working is someething we could do, but chose not to.

    The other possibility is that VMS is _supposed_ to work OK in this
    configuration, but this specific VM setup has been untested by VSI until >>> now. That means there is a bug in the VMS code itself which needs fixing. >>
    We are not claiming support for Proxmox, although that testing has begun.
    Given that it is a KVM-based hypervisor, getting it fully supported
    should not
    be difficult, but we're not there yet.

    It is for these reasons that we've been quite conservative about what is
    supported.

    We are interested in any feedback we get, but that doesn't mean we're
    going to respond to every
    problem immediately when it's an unsupported configuration.

    At the Connect IT Symposium, Thilo Lauer (VSI) yesterday gave an
    introduction to Proxmox and demoed an OpenVMS instance running under
    Proxmox. Camiel Vanderhoeven also mentioned that official support for
    Proxmox as a hypervisor is relatively high on their list, especially due
    to the changes at VMware since the takeover by Broadcom.

    So - stay tuned...

    Hans.

    PS: Camiel has been appointed "Chief Architect and Strategist" at VSI >recently. In his new role, he will relief Clair Grant from some of his >responsibilities.

    Interesting. Personally, I'd really like to see OpenVMS get
    official support on Oxide hardware. https://oxide.computer/

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stephen Hoffman@21:1/5 to Simon Clubley on Mon Apr 15 14:44:10 2024
    On 2024-04-08 17:30:15 +0000, Simon Clubley said:

    Given that the VMS mindset is supposed to be one of robustness and reliability, perhaps the proper approach is to enforce a default refuse
    to boot on unsupposed configuration, but allow an override with a boot
    flag or SYSGEN parameter.

    A fondness for arcana, inappropriate defaults, and documented and ill-documented knobs—many of these defaults and these knobs tracing
    back to the fallout arising from compatibility—seemingly became commonly-accepted practice decades ago.

    Put differently, documenting the potential for or incidents of a limit
    or a crash or appropriately-trained and experienced staff has long been
    viewed as meeting minimal requirements, either via the SPD or via some
    other detail or document elsewhere. One of the bootcamp sessions
    covering known issues with a supported feature was just surreal, for
    instance. There have been other examples. Expectations and assumptions
    can all change, too. I know mine have. But that's all fodder for
    another time.

    That way, people don't accidentally use an unsupported configuration in production use, but you also don't stop people from using an
    unsupported configuration if they choose to do so.

    I fixed a whole pile of support calls with diagnostics shown for
    unsupported configurations, and fixed even more support calls by
    automatically detecting and fixing the most common of the errors.

    It's quite correct that unsupported-hardware configurations are
    incredibly difficult or ~impossible to detect, but overt mistakes—configuration detection analogous to that Python script—should
    be built in to the OpenVMS console or incorporated into the early
    bootstrap. Same for similar detection built into (or shared with) the installer.

    Following another longstanding OpenVMS practice of far too chatty
    bootstraps (q.v. inappropriate defaults), adding diagnostics and adding
    a hardware configuration display and showing an unsupported
    configuration diagnostic as needed there would parallel longstanding
    console practices.

    I'd probably add the unsupported display into the x86-64 error analysis
    tooling or into SHOW CPU or some other diagnostic tooling visible at
    run-time, and shown in SDA for crashes. This not to imply error-related
    tooling is ever going to be remotely easy to create and maintain on
    x86-64.

    Architecturally, adding a hardware section into the system or
    site-local device configuration database would make sense for this
    detection. If somebody wants to mask the unsupported-configuration
    error, they can edit their change into the site-local hardware
    configuration data. (q.v. arcana)

    However, if you implement this, an impossible to miss message should be output on every boot so that the flag is not set and then forgotten
    about.

    Identifying everything unsupported is ~impossible given the constraints
    OpenVMS operates under. But I wouldn't be concerned about adding some diagnostics to an already-chatty bootstrap either, given normal OpenVMS bootstraps and startups are purpose-designed to make that easy to hide
    info and easy to ignore. Hardware, too. Default Itanium startups are
    just stupidly chatty.



    --
    Pure Personal Opinion | HoffmanLabs LLC

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to Stephen Hoffman on Mon Apr 15 22:23:44 2024
    On Mon, 15 Apr 2024 14:44:10 -0400, Stephen Hoffman wrote:

    It's quite correct that unsupported-hardware configurations are
    incredibly difficult or ~impossible to detect ...

    Which is why it would have been so much simpler if VSI had not gone the
    “not invented here” route, and built their x86 port on top of an existing OS, leaving all the tricky hardware stuff to that.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)