workflows.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Guillaume Tucker <gtucker@gtucker.io>
To: Nathan Chancellor <nathan@kernel.org>,
	Ben Copeland <ben.copeland@linaro.org>,
	Konstantin Ryabitsev <konstantin@linuxfoundation.org>,
	Miguel Ojeda <ojeda@kernel.org>, Nicolas Schier <nsc@kernel.org>
Cc: "Arnd Bergmann" <arnd@arndb.de>,
	"Onur Özkan" <work@onurozkan.dev>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	workflows@vger.kernel.org,
	automated-testing@lists.yoctoproject.org,
	"kernelci@lists.linux.dev" <kernelci@lists.linux.dev>
Subject: Re: Hosting first-party kernel.org container images
Date: Thu, 19 Mar 2026 11:37:04 +0100	[thread overview]
Message-ID: <81522f93-6fe2-48e0-b95f-654a83f8b6ba@gtucker.io> (raw)
In-Reply-To: <20260310004815.GA3293460@ax162>

Hi Nathan et al,

On 10/03/2026 1:48 am, Nathan Chancellor wrote:
> Hi Guillaume,
> 
> On Wed, Feb 25, 2026 at 03:44:13PM +0100, Guillaume Tucker wrote:
>> This boils things down to a few practical options:
>>
>> 1. treating TuxMake images with kernel.org toolchains as the de facto
>>     stardard,
>>
>> 2. creating a repository from scratch on git.kernel.org with
>>     independent hosting for base images,
>>
>> 3. some middle ground to be defined which would remove the risks
>>     associated with third parties without duplicating efforts.
>>
>> I feel it would be good to have more maintainers' feedback though.
>>
>> Nathan, Nicolas, Miguel - what are your thoughts on this?
> 
> To be entirely honest, I do not really have a strong opinion here. I
> generally agree with your thoughts around branded container images,
> although I do think that TuxMake's images tend to be fairly lean, so
> those easily could become the recommended images without many downsides
> aside from maybe where they are hosted and how they are maintained.
> Having a clean set of Containerfiles on git.kernel.org does not sound
> like a bad idea, especially if they would be structured in such a way
> that other entities could customize them for their use case further. I
> guess its usefulness really depends on the other stakeholders like
> KernelCI. It seems like there has to be some sort of buy in from the
> kernel.org administrators around hosting built container images
> somewhere on kernel.org though, as I don't think the regular developer
> is going to want to build images locally. Not really sure what that
> looks like.

Thank you for the feedback, it's very valuable even without a strong
opinion regarding the 3 options in my previous email.  It also tends
to confirm that the risks I mentioned aren't too critical to get
started, having some developer adoption is more important for now.

With all this in mind, I believe we can follow a step-by-step
approach to start simple and deploy more tailored solutions as and
when the need arises.  This can be seen as a bit of a Beta testing
phase until there is enough momentum to look into the longer term.

So here's what I would like to propose for the short term:

1. review current TuxMake kernel.org toolchain images[1] and
    determine what needs to be added or changed there (e.g. I don't
    see any GCC ones right now)

2. update the scripts/container tool to rely on tuxmake korg images
    with default entries in a reference user settings file

3. encourage kernel developers to go and try it out and provide
    feedback, maybe even run a small community survey

4. review the situation after a while e.g. once v7.1-rc2 is out and
    decide what steps to take next based on community priorities

I believe there aren't any blockers here so we can probably just give
it a try as an experiment and see how it goes, unless someone has
anything else to suggest.

Things like moving the Containerfiles to git.kernel.org or hosting
the images in a dedicated registry etc. should eventually emerge by
themselves if there is a real need for them.

Best wishes,
Guillaume

[1] https://hub.docker.com/u/tuxmake?search=korg


  reply	other threads:[~2026-03-19 10:37 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-12-19 13:37 Guillaume Tucker
2026-02-02 12:07 ` Ben Copeland
2026-02-25 14:44   ` Guillaume Tucker
2026-03-10  0:48     ` Nathan Chancellor
2026-03-19 10:37       ` Guillaume Tucker [this message]
2026-03-19 11:10     ` Miguel Ojeda
2026-03-19 14:15       ` Theodore Tso

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=81522f93-6fe2-48e0-b95f-654a83f8b6ba@gtucker.io \
    --to=gtucker@gtucker.io \
    --cc=arnd@arndb.de \
    --cc=automated-testing@lists.yoctoproject.org \
    --cc=ben.copeland@linaro.org \
    --cc=kernelci@lists.linux.dev \
    --cc=konstantin@linuxfoundation.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=nathan@kernel.org \
    --cc=nsc@kernel.org \
    --cc=ojeda@kernel.org \
    --cc=work@onurozkan.dev \
    --cc=workflows@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox