Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp3235297yba; Tue, 16 Apr 2019 07:23:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqzh1uacetPPWxYQdCHz5J747e8v8Rgu+9yWSXzTo/vsqn7ND81EIrtyx4JLp1QrjzC5UCrS X-Received: by 2002:a17:902:e182:: with SMTP id cd2mr815085plb.240.1555424625931; Tue, 16 Apr 2019 07:23:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555424625; cv=none; d=google.com; s=arc-20160816; b=vdwKo8qzczGKw4iPMfly9hAx3002gb3/97PtJO63aDwgeRV9Ax35PMeemJ7xwmgwm+ jmro78G44rAS0cCQH9AAYb3QvmOPDUW+c/sRjppoDFrKNlT2qXjbmLL5FLz4um/iZYVe n9w+zE05bNWvnke8ME7fAlSWGL5sFCj3uWvaJhjiczYtTSJC+AnJrNwlubKfbEmPwOeK ARzVGoOZ5k+47MWullPtN21mPjub3Xgf2cX1Sc7L+mosS092kP0DHRk9g+7trrej5Vc2 NxMlD0T1BBVfzB2j16BU6NXRL3FKe/gkX1miRVzHAFxpI/zjOYJhCmEjhHFgMvD62Ped Zi/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=OcD4LbBRqlp8+yHFexLiauJtPHzAOc8ec0C9z0aFh0I=; b=pZpMnJqCKQE5vVtu+JISM8duRrbVelPC3haMnnHyweFPyh0sXSLhftx43lw3Kaur4b rgrI//4+bZf88DE5B52mCsexWopqcIJ9sOe3FwLKRl/NChXkLRrkL1RG/uONCsgWQjY6 zs78Ua0CuUU+uWwq+wO+4z6qUxwrHepDW6s2SzrtHiznL0/tt/EdblaCGzXNy8r0btI2 0e78wdQs3CK51yALczLipNBFsr1Fzf6ogf2Hy1c0vrl8QzLSDBCu037+u5czHifyRYke 9ECALGXYug66Rh13ngvkTUofVk7FtxCfJK2IX3nBSxLzpTZtjIIXpwRVzLooH2gvBd9+ hgWA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ILMMSuOB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p2si46478082pgk.326.2019.04.16.07.23.29; Tue, 16 Apr 2019 07:23:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ILMMSuOB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729202AbfDPOWo (ORCPT + 99 others); Tue, 16 Apr 2019 10:22:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:59546 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726230AbfDPOWo (ORCPT ); Tue, 16 Apr 2019 10:22:44 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1C638223F9; Tue, 16 Apr 2019 14:22:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555424562; bh=O+vn7j+KiALJmWv3qU2+sb65RbNFlWmoNmJneEGEbJs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ILMMSuOB2iYX3Tbs/6W2fD8W+t4uruHvlk1QVwFawihIWny38wHmn4MTHkYjRDpfi oGfDugQuvh38UIW6HESuSEDVKjguPBaja+dnb/reIV2Mu1lHIepaHO9rEwVdfLbI3a AxulaqysRv/AQZ1euj6z1r4Pfvl16iPTUY11AvCw= Date: Tue, 16 Apr 2019 16:22:40 +0200 From: Greg Kroah-Hartman To: Steven Rostedt Cc: Karim Yaghmour , Joel Fernandes , Kees Cook , Olof Johansson , Alexei Starovoitov , Joel Fernandes , Linux Kernel Mailing List , Qais Yousef , Dietmar Eggemann , Manoj Rao , Andrew Morton , Alexei Starovoitov , atish patra , Daniel Colascione , Dan Williams , Guenter Roeck , Jonathan Corbet , Android Kernel Team , "open list:DOCUMENTATION" , "open list:KERNEL SELFTEST FRAMEWORK" , linux-trace-devel@vger.kernel.org, Masahiro Yamada , Masami Hiramatsu , Randy Dunlap , Shuah Khan , Yonghong Song Subject: Re: [PATCH v5 1/3] Provide in-kernel headers to make extending kernel easier Message-ID: <20190416142240.GA31920@kroah.com> References: <20190411031540.ehezr6kq7ouobpzx@ast-mbp.dhcp.thefacebook.com> <20190415104109.64d914f3@gandalf.local.home> <20190416083306.5646a687@gandalf.local.home> <20190416124939.GB6027@kroah.com> <20190416130440.GA7944@localhost> <20190416094509.1af6326b@gandalf.local.home> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190416094509.1af6326b@gandalf.local.home> User-Agent: Mutt/1.11.4 (2019-03-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 16, 2019 at 09:45:09AM -0400, Steven Rostedt wrote: > On Tue, 16 Apr 2019 09:32:37 -0400 > Karim Yaghmour wrote: > > > >>> Then we should perhaps make a new file system call tarballs ;-) > > >>> > > >>> /sys/kernel/tarballs/ > > >>> > > >>> and place everything there. That way it removes it from /proc (which is > > >>> the worse place for that) and also makes it something other than debug. > > >>> That's what I did for tracefs. > > >> > > >> As horrible as that suggestion is, it does kind of make sense :) > > >> > > >> We can't put this in debugfs as that's only for debugging and systems > > >> should never have that mounted for normal operations (users want to > > >> build ebpf programs), and /proc really should be for processes but that > > >> horse is long left the barn. > > >> > > >> But, I'm willing to consider putting this either in a system-fs-like > > >> filesystem, or just in sysfs itself, we do have /sys/kernel/ to play > > >> around in if the main objection is that we should not be cluttering up > > >> /proc with stuff like this. > > >> > > > > > > I am ok with the suggestion of /sys/kernel for the archive. That also seems > > > to fit well with the idea that the headers are kernel related and probably > > > belong here more strictly speaking, than /proc. > > > > This makes sense. And if it alleviates concerns regarding extending > > /proc ABIs then might as well switch to this. > > > > Olof, what do you think of this? > > BTW, the name "tarballs" was kind of a joke. Probably should come up > with a better name. Although, I'm fine with tarballsfs ;-) No need to have this be a separate filesystem, we can use a binary sysfs file in /sys/kernel/ for this as the kernel is not doing any "parsing" of the data, it is just dumping it out to userspace. If I make /sys/kernel/config.gz be the same thing as /proc/config.gz will you fix up 'make localmodconfig' to use it? :) thanks, greg k-h