ksummit.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
* [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
@ 2017-06-25  7:24 Leon Romanovsky
  2017-06-25 17:32 ` Linus Torvalds
  0 siblings, 1 reply; 15+ messages in thread
From: Leon Romanovsky @ 2017-06-25  7:24 UTC (permalink / raw)
  To: ksummit-discuss

[-- Attachment #1: Type: text/plain, Size: 790 bytes --]

There is a steady flow of patches which bump driver and module versions.

The differences in views add [1] an email burden, which can be easily avoided
by adding policy into CodingStyle guide.

As an example of such patches: "Succeeded" [2] vs. "Failed" [3].

I think that maintainers summit with major code "pushers" is the right venue
to get the answers on the following questions:
 * Can we come with unified policy about those patches?
 * Can we remove them? If yes, is it possible to replace MODULE_VERSION in all patches to point to kernel version?
 * Does such change fail under category "UAPI changes and we can't change" or not?

Thanks

[1] https://patchwork.kernel.org/patch/9735855/
[2] https://patchwork.ozlabs.org/patch/779864/
[3] https://patchwork.kernel.org/patch/7490321/

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-06-25  7:24 [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions Leon Romanovsky
@ 2017-06-25 17:32 ` Linus Torvalds
  2017-06-25 18:19   ` Leon Romanovsky
  2017-06-30 16:21   ` Darren Hart
  0 siblings, 2 replies; 15+ messages in thread
From: Linus Torvalds @ 2017-06-25 17:32 UTC (permalink / raw)
  To: Leon Romanovsky; +Cc: ksummit-discuss

On Sun, Jun 25, 2017 at 12:24 AM, Leon Romanovsky <leon@kernel.org> wrote:
> There is a steady flow of patches which bump driver and module versions.
>
>  * Can we come with unified policy about those patches?

We pretty much *have* a unified policy, it's just that I think rdma is crazy.

The unified policy is pretty much that version codes do not matter, do
not exist, and do not get updated.

Things are supposed to be backwards and forwards compatible, because
we don't accept breakage in user space anyway. So versioning is
pointless, and only causes problems.

It causes problems not just because of the conflict issues, but
because it's fundamentally wrong, and makes driver writers think that
it's ok to change interfaces and use versioning to show they changed.
It's *not* OK.

Sometimes you have feature masks (which just mean that it's ok to
_add_ interfaces rather than change them, and make it possible for
user space to check if the new interface exists), but even that is
generally the exception rather than the rule and should be used very
very carefully and preferably not at all.

                  Linus

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-06-25 17:32 ` Linus Torvalds
@ 2017-06-25 18:19   ` Leon Romanovsky
  2017-06-25 18:37     ` Linus Torvalds
  2017-06-30 16:21   ` Darren Hart
  1 sibling, 1 reply; 15+ messages in thread
From: Leon Romanovsky @ 2017-06-25 18:19 UTC (permalink / raw)
  To: Linus Torvalds; +Cc: ksummit-discuss

[-- Attachment #1: Type: text/plain, Size: 1960 bytes --]

On Sun, Jun 25, 2017 at 10:32:52AM -0700, Linus Torvalds wrote:
> On Sun, Jun 25, 2017 at 12:24 AM, Leon Romanovsky <leon@kernel.org> wrote:
> > There is a steady flow of patches which bump driver and module versions.
> >
> >  * Can we come with unified policy about those patches?
>
> We pretty much *have* a unified policy, it's just that I think rdma is crazy.
>
> The unified policy is pretty much that version codes do not matter, do
> not exist, and do not get updated.

I'm pretty sure that not everyone is aware of it. Those examples of
"accepted" patches are not from RDMA and maybe it will be awkward to hear,
but in RDMA subsystem we don't allow such patches [1].

My attempt to enforce such policy in other subsystem didn't work [2] and
in addition to that failed attempt, I bombarded internally with customers'
requests who have cargo cult to update those versions anyway ("like everyone else").
This is why I'm proposing to ban those patches and remove their exposure for
the drivers/* completely.

>
> Things are supposed to be backwards and forwards compatible, because
> we don't accept breakage in user space anyway. So versioning is
> pointless, and only causes problems.
>
> It causes problems not just because of the conflict issues, but
> because it's fundamentally wrong, and makes driver writers think that
> it's ok to change interfaces and use versioning to show they changed.
> It's *not* OK.

Great, so why are we continuing to allow patches with MODULE_VERSION and
DRIVER_VERSION changes?

>
> Sometimes you have feature masks (which just mean that it's ok to
> _add_ interfaces rather than change them, and make it possible for
> user space to check if the new interface exists), but even that is
> generally the exception rather than the rule and should be used very
> very carefully and preferably not at all.


[1] https://patchwork.kernel.org/patch/9735855/
[2] https://lkml.org/lkml/2016/7/15/17

>
>                   Linus

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-06-25 18:19   ` Leon Romanovsky
@ 2017-06-25 18:37     ` Linus Torvalds
  2017-06-25 19:05       ` Leon Romanovsky
  0 siblings, 1 reply; 15+ messages in thread
From: Linus Torvalds @ 2017-06-25 18:37 UTC (permalink / raw)
  To: Leon Romanovsky; +Cc: ksummit-discuss

On Sun, Jun 25, 2017 at 11:19 AM, Leon Romanovsky <leon@kernel.org> wrote:
>
> Great, so why are we continuing to allow patches with MODULE_VERSION and
> DRIVER_VERSION changes?

I suspect they just haven't caused problems elsewhere.

And honestly, they aren't that common. Grepping for MODULE_VERSION and
DRIVER_VERSION shows more than I would like, but we're talking
hundreds, not thousands (and lots of them are basically dead, stale
code - ATA etc, or just joke names - usb).

                  Linus

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-06-25 18:37     ` Linus Torvalds
@ 2017-06-25 19:05       ` Leon Romanovsky
  2017-06-25 21:32         ` Alexandre Belloni
  2017-06-26  5:00         ` Greg KH
  0 siblings, 2 replies; 15+ messages in thread
From: Leon Romanovsky @ 2017-06-25 19:05 UTC (permalink / raw)
  To: Linus Torvalds; +Cc: ksummit-discuss

[-- Attachment #1: Type: text/plain, Size: 797 bytes --]

On Sun, Jun 25, 2017 at 11:37:12AM -0700, Linus Torvalds wrote:
> On Sun, Jun 25, 2017 at 11:19 AM, Leon Romanovsky <leon@kernel.org> wrote:
> >
> > Great, so why are we continuing to allow patches with MODULE_VERSION and
> > DRIVER_VERSION changes?
>
> I suspect they just haven't caused problems elsewhere.
>
> And honestly, they aren't that common. Grepping for MODULE_VERSION and
> DRIVER_VERSION shows more than I would like, but we're talking
> hundreds, not thousands (and lots of them are basically dead, stale
> code - ATA etc, or just joke names - usb).

I see it differently, from my point of view, it is pretty active,
especially in the subsystems where new drivers are added more often,
but if you say that the policy exists, it is enough for me.

Thanks

>
>                   Linus

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-06-25 19:05       ` Leon Romanovsky
@ 2017-06-25 21:32         ` Alexandre Belloni
  2017-06-26  4:51           ` Leon Romanovsky
  2017-06-26  5:00         ` Greg KH
  1 sibling, 1 reply; 15+ messages in thread
From: Alexandre Belloni @ 2017-06-25 21:32 UTC (permalink / raw)
  To: Leon Romanovsky; +Cc: ksummit-discuss

Hi,

On 25/06/2017 at 22:05:29 +0300, Leon Romanovsky wrote:
> On Sun, Jun 25, 2017 at 11:37:12AM -0700, Linus Torvalds wrote:
> > On Sun, Jun 25, 2017 at 11:19 AM, Leon Romanovsky <leon@kernel.org> wrote:
> > >
> > > Great, so why are we continuing to allow patches with MODULE_VERSION and
> > > DRIVER_VERSION changes?
> >
> > I suspect they just haven't caused problems elsewhere.
> >
> > And honestly, they aren't that common. Grepping for MODULE_VERSION and
> > DRIVER_VERSION shows more than I would like, but we're talking
> > hundreds, not thousands (and lots of them are basically dead, stale
> > code - ATA etc, or just joke names - usb).
> 
> I see it differently, from my point of view, it is pretty active,
> especially in the subsystems where new drivers are added more often,
> but if you say that the policy exists, it is enough for me.
> 

A while ago, I went and removed all of them from the RTC subsystem.



-- 
Alexandre Belloni, Free Electrons
Embedded Linux and Kernel engineering
http://free-electrons.com

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-06-25 21:32         ` Alexandre Belloni
@ 2017-06-26  4:51           ` Leon Romanovsky
  2017-06-26  6:47             ` Geert Uytterhoeven
  0 siblings, 1 reply; 15+ messages in thread
From: Leon Romanovsky @ 2017-06-26  4:51 UTC (permalink / raw)
  To: Alexandre Belloni; +Cc: ksummit-discuss

[-- Attachment #1: Type: text/plain, Size: 1328 bytes --]

On Sun, Jun 25, 2017 at 11:32:45PM +0200, Alexandre Belloni wrote:
> Hi,
>
> On 25/06/2017 at 22:05:29 +0300, Leon Romanovsky wrote:
> > On Sun, Jun 25, 2017 at 11:37:12AM -0700, Linus Torvalds wrote:
> > > On Sun, Jun 25, 2017 at 11:19 AM, Leon Romanovsky <leon@kernel.org> wrote:
> > > >
> > > > Great, so why are we continuing to allow patches with MODULE_VERSION and
> > > > DRIVER_VERSION changes?
> > >
> > > I suspect they just haven't caused problems elsewhere.
> > >
> > > And honestly, they aren't that common. Grepping for MODULE_VERSION and
> > > DRIVER_VERSION shows more than I would like, but we're talking
> > > hundreds, not thousands (and lots of them are basically dead, stale
> > > code - ATA etc, or just joke names - usb).
> >
> > I see it differently, from my point of view, it is pretty active,
> > especially in the subsystems where new drivers are added more often,
> > but if you say that the policy exists, it is enough for me.
> >
>
> A while ago, I went and removed all of them from the RTC subsystem.

I assume that you are referring to the commit fa5691131a87 ("rtc: remove useless DRV_VERSION").

Let's see how similar patch will be accepted in RDMA, netdev communities.

Thanks

>
>
>
> --
> Alexandre Belloni, Free Electrons
> Embedded Linux and Kernel engineering
> http://free-electrons.com

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-06-25 19:05       ` Leon Romanovsky
  2017-06-25 21:32         ` Alexandre Belloni
@ 2017-06-26  5:00         ` Greg KH
  2017-06-26  6:03           ` Leon Romanovsky
  1 sibling, 1 reply; 15+ messages in thread
From: Greg KH @ 2017-06-26  5:00 UTC (permalink / raw)
  To: Leon Romanovsky; +Cc: ksummit-discuss

On Sun, Jun 25, 2017 at 10:05:29PM +0300, Leon Romanovsky wrote:
> On Sun, Jun 25, 2017 at 11:37:12AM -0700, Linus Torvalds wrote:
> > On Sun, Jun 25, 2017 at 11:19 AM, Leon Romanovsky <leon@kernel.org> wrote:
> > >
> > > Great, so why are we continuing to allow patches with MODULE_VERSION and
> > > DRIVER_VERSION changes?
> >
> > I suspect they just haven't caused problems elsewhere.
> >
> > And honestly, they aren't that common. Grepping for MODULE_VERSION and
> > DRIVER_VERSION shows more than I would like, but we're talking
> > hundreds, not thousands (and lots of them are basically dead, stale
> > code - ATA etc, or just joke names - usb).
> 
> I see it differently, from my point of view, it is pretty active,
> especially in the subsystems where new drivers are added more often,

It takes a few years for companies to realize that the version numbers
mean nothing.  So give it time, it will slow down.  Or you can just
delete all of them at once, making it easier for you in the end.

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-06-26  5:00         ` Greg KH
@ 2017-06-26  6:03           ` Leon Romanovsky
  2017-06-26 15:21             ` Levin, Alexander (Sasha Levin)
  0 siblings, 1 reply; 15+ messages in thread
From: Leon Romanovsky @ 2017-06-26  6:03 UTC (permalink / raw)
  To: Greg KH; +Cc: ksummit-discuss

[-- Attachment #1: Type: text/plain, Size: 1255 bytes --]

On Mon, Jun 26, 2017 at 07:00:52AM +0200, Greg KH wrote:
> On Sun, Jun 25, 2017 at 10:05:29PM +0300, Leon Romanovsky wrote:
> > On Sun, Jun 25, 2017 at 11:37:12AM -0700, Linus Torvalds wrote:
> > > On Sun, Jun 25, 2017 at 11:19 AM, Leon Romanovsky <leon@kernel.org> wrote:
> > > >
> > > > Great, so why are we continuing to allow patches with MODULE_VERSION and
> > > > DRIVER_VERSION changes?
> > >
> > > I suspect they just haven't caused problems elsewhere.
> > >
> > > And honestly, they aren't that common. Grepping for MODULE_VERSION and
> > > DRIVER_VERSION shows more than I would like, but we're talking
> > > hundreds, not thousands (and lots of them are basically dead, stale
> > > code - ATA etc, or just joke names - usb).
> >
> > I see it differently, from my point of view, it is pretty active,
> > especially in the subsystems where new drivers are added more often,
>
> It takes a few years for companies to realize that the version numbers
> mean nothing.  So give it time, it will slow down.  Or you can just
> delete all of them at once, making it easier for you in the end.

OK, let's start in small scale and limit myself to MODULE_VERSION at this stage.
https://patchwork.kernel.org/patch/9808651/

Thanks

>
> thanks,
>
> greg k-h

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-06-26  4:51           ` Leon Romanovsky
@ 2017-06-26  6:47             ` Geert Uytterhoeven
  0 siblings, 0 replies; 15+ messages in thread
From: Geert Uytterhoeven @ 2017-06-26  6:47 UTC (permalink / raw)
  To: Leon Romanovsky; +Cc: ksummit-discuss

On Mon, Jun 26, 2017 at 6:51 AM, Leon Romanovsky <leon@kernel.org> wrote:
> On Sun, Jun 25, 2017 at 11:32:45PM +0200, Alexandre Belloni wrote:
>> Hi,
>>
>> On 25/06/2017 at 22:05:29 +0300, Leon Romanovsky wrote:
>> > On Sun, Jun 25, 2017 at 11:37:12AM -0700, Linus Torvalds wrote:
>> > > On Sun, Jun 25, 2017 at 11:19 AM, Leon Romanovsky <leon@kernel.org> wrote:
>> > > >
>> > > > Great, so why are we continuing to allow patches with MODULE_VERSION and
>> > > > DRIVER_VERSION changes?
>> > >
>> > > I suspect they just haven't caused problems elsewhere.
>> > >
>> > > And honestly, they aren't that common. Grepping for MODULE_VERSION and
>> > > DRIVER_VERSION shows more than I would like, but we're talking
>> > > hundreds, not thousands (and lots of them are basically dead, stale
>> > > code - ATA etc, or just joke names - usb).
>> >
>> > I see it differently, from my point of view, it is pretty active,
>> > especially in the subsystems where new drivers are added more often,
>> > but if you say that the policy exists, it is enough for me.
>> >
>>
>> A while ago, I went and removed all of them from the RTC subsystem.
>
> I assume that you are referring to the commit fa5691131a87 ("rtc: remove useless DRV_VERSION").
>
> Let's see how similar patch will be accepted in RDMA, netdev communities.

The only version that matters is CONFIG_LOCALVERSION_AUTO=y.

Gr{oetje,eeting}s,

                        Geert

--
Geert Uytterhoeven -- There's lots of Linux beyond ia32 -- geert@linux-m68k.org

In personal conversations with technical people, I call myself a hacker. But
when I'm talking to journalists I just say "programmer" or something like that.
                                -- Linus Torvalds

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-06-26  6:03           ` Leon Romanovsky
@ 2017-06-26 15:21             ` Levin, Alexander (Sasha Levin)
  2017-06-26 18:25               ` Leon Romanovsky
  0 siblings, 1 reply; 15+ messages in thread
From: Levin, Alexander (Sasha Levin) @ 2017-06-26 15:21 UTC (permalink / raw)
  To: Leon Romanovsky; +Cc: ksummit-discuss

On Mon, Jun 26, 2017 at 09:03:32AM +0300, Leon Romanovsky wrote:
>OK, let's start in small scale and limit myself to MODULE_VERSION at this stage.
>https://patchwork.kernel.org/patch/9808651/

Isn't it the case that something like this will actually break the ABI?

I assume that a bunch of different companies have scripts that pull out the module version out of the module and make sure that it's at some value that works with the rest of their tools, right?

I also have to assume that these scripts will horribly break when the value just disappears.

-- 

Thanks,
Sasha

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-06-26 15:21             ` Levin, Alexander (Sasha Levin)
@ 2017-06-26 18:25               ` Leon Romanovsky
  0 siblings, 0 replies; 15+ messages in thread
From: Leon Romanovsky @ 2017-06-26 18:25 UTC (permalink / raw)
  To: Levin, Alexander (Sasha Levin); +Cc: ksummit-discuss

[-- Attachment #1: Type: text/plain, Size: 861 bytes --]

On Mon, Jun 26, 2017 at 03:21:10PM +0000, Levin, Alexander (Sasha Levin) wrote:
> On Mon, Jun 26, 2017 at 09:03:32AM +0300, Leon Romanovsky wrote:
> >OK, let's start in small scale and limit myself to MODULE_VERSION at this stage.
> >https://patchwork.kernel.org/patch/9808651/
>
> Isn't it the case that something like this will actually break the ABI?

From the responses, the answer is NO, it is not ABI.

>
> I assume that a bunch of different companies have scripts that pull out the module version out of the module and make sure that it's at some value that works with the rest of their tools, right?
>
> I also have to assume that these scripts will horribly break when the value just disappears.

It is the same as to rely on console prints as reliable source for those scripts. It is broken by design.

>
> --
>
> Thanks,
> Sasha

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-06-25 17:32 ` Linus Torvalds
  2017-06-25 18:19   ` Leon Romanovsky
@ 2017-06-30 16:21   ` Darren Hart
  2017-07-03 20:41     ` Jiri Kosina
  1 sibling, 1 reply; 15+ messages in thread
From: Darren Hart @ 2017-06-30 16:21 UTC (permalink / raw)
  To: Linus Torvalds; +Cc: ksummit-discuss

On Sun, Jun 25, 2017 at 10:32:52AM -0700, Linus Torvalds wrote:
> On Sun, Jun 25, 2017 at 12:24 AM, Leon Romanovsky <leon@kernel.org> wrote:
> > There is a steady flow of patches which bump driver and module versions.
> >
> >  * Can we come with unified policy about those patches?
> 
> We pretty much *have* a unified policy, it's just that I think rdma is crazy.
> 
> The unified policy is pretty much that version codes do not matter, do
> not exist, and do not get updated.
> 

I make the point internally that without a stable-abi, the driver is not
stand-alone, and so the "version" is easily shown to not be independent
from the kernel version (or the distro package version).

> Things are supposed to be backwards and forwards compatible, because
> we don't accept breakage in user space anyway. So versioning is
> pointless, and only causes problems.
> 
> It causes problems not just because of the conflict issues, but
> because it's fundamentally wrong, and makes driver writers think that
> it's ok to change interfaces and use versioning to show they changed.
> It's *not* OK.
> 
> Sometimes you have feature masks (which just mean that it's ok to
> _add_ interfaces rather than change them, and make it possible for
> user space to check if the new interface exists), but even that is
> generally the exception rather than the rule and should be used very
> very carefully and preferably not at all.
> 

While the module version is clearly a flawed concept for Linux drivers,
I do think we should discuss the problem they are intended to address:
knowing what's in a particular instance of a driver.

I see three categories of changes vendors need to be able to track:

1. Bug Fixes
2. Performance enhancements
3. New Features

The first is easily managed through the stable kernel process. Vendors
ensure bug fixes are pushed back to stable, distros pick them up from
there, done.

The second is split into two categories. Many performance regressions
can be accommodated via the stable kernel rules. Regressions with large
mitigation patches and performance enhancements currently need to be
tracked independently from kernel version as they are backported to
distro / product kernels.

New features also fall into the independent tracking bucket, although
your point about feature masks could reduce that need. Is there a
definitive mechanism for the feature mask approach? I see a lot of
sysfs_filename:value key:value pairs for this kind of thing.

-- 
Darren Hart
VMware Open Source Technology Center

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-06-30 16:21   ` Darren Hart
@ 2017-07-03 20:41     ` Jiri Kosina
  2017-07-03 21:25       ` Darren Hart
  0 siblings, 1 reply; 15+ messages in thread
From: Jiri Kosina @ 2017-07-03 20:41 UTC (permalink / raw)
  To: Darren Hart; +Cc: ksummit-discuss

On Fri, 30 Jun 2017, Darren Hart wrote:

> New features also fall into the independent tracking bucket, although 
> your point about feature masks could reduce that need. Is there a 
> definitive mechanism for the feature mask approach? I see a lot of 
> sysfs_filename:value key:value pairs for this kind of thing.

Adding those sysfs attributes seems like exactly the thing that people 
will keep forgetting to do, as there is no (real) functionality depending 
on them.

I doubt there is any better 'description' of the 'state' of the driver 
than SHA of the topmost commit + the tree it's related to.

-- 
Jiri Kosina
SUSE Labs

^ permalink raw reply	[flat|nested] 15+ messages in thread

* Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions
  2017-07-03 20:41     ` Jiri Kosina
@ 2017-07-03 21:25       ` Darren Hart
  0 siblings, 0 replies; 15+ messages in thread
From: Darren Hart @ 2017-07-03 21:25 UTC (permalink / raw)
  To: Jiri Kosina; +Cc: ksummit-discuss

On Mon, Jul 03, 2017 at 10:41:16PM +0200, Jiri Kosina wrote:
> On Fri, 30 Jun 2017, Darren Hart wrote:
> 
> > New features also fall into the independent tracking bucket, although 
> > your point about feature masks could reduce that need. Is there a 
> > definitive mechanism for the feature mask approach? I see a lot of 
> > sysfs_filename:value key:value pairs for this kind of thing.
> 
> Adding those sysfs attributes seems like exactly the thing that people 
> will keep forgetting to do, as there is no (real) functionality depending 
> on them.
> 
> I doubt there is any better 'description' of the 'state' of the driver 
> than SHA of the topmost commit + the tree it's related to.

This is exactly what I have been saying in my inward facing roles. Here
I'm trying to make sure I'm not missing something that makes this not
100% accurate.

For specific things, I could see those sysfs attributes being useful,
but as you say, they are informational only.

-- 
Darren Hart
VMware Open Source Technology Center

^ permalink raw reply	[flat|nested] 15+ messages in thread

end of thread, other threads:[~2017-07-03 21:25 UTC | newest]

Thread overview: 15+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-06-25  7:24 [Ksummit-discuss] [MAINTAINERS SUMMIT] Driver and/or module versions Leon Romanovsky
2017-06-25 17:32 ` Linus Torvalds
2017-06-25 18:19   ` Leon Romanovsky
2017-06-25 18:37     ` Linus Torvalds
2017-06-25 19:05       ` Leon Romanovsky
2017-06-25 21:32         ` Alexandre Belloni
2017-06-26  4:51           ` Leon Romanovsky
2017-06-26  6:47             ` Geert Uytterhoeven
2017-06-26  5:00         ` Greg KH
2017-06-26  6:03           ` Leon Romanovsky
2017-06-26 15:21             ` Levin, Alexander (Sasha Levin)
2017-06-26 18:25               ` Leon Romanovsky
2017-06-30 16:21   ` Darren Hart
2017-07-03 20:41     ` Jiri Kosina
2017-07-03 21:25       ` Darren Hart

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox