Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754148AbYGaR3z (ORCPT ); Thu, 31 Jul 2008 13:29:55 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752247AbYGaR3n (ORCPT ); Thu, 31 Jul 2008 13:29:43 -0400 Received: from outbound-wa4.frontbridge.com ([216.32.181.16]:24772 "EHLO WA4EHSOBE003.bigfish.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751638AbYGaR3l (ORCPT ); Thu, 31 Jul 2008 13:29:41 -0400 X-BigFish: VPS2(zz1418M98dR446ihzz10d3izzz2fh6bh) Message-ID: <4891F724.3030406@am.sony.com> Date: Thu, 31 Jul 2008 10:32:20 -0700 From: Tim Bird User-Agent: Thunderbird 2.0.0.14 (X11/20080501) MIME-Version: 1.0 To: Adrian Bunk CC: Thomas Petazzoni , linux-kernel@vger.kernel.org, linux-embedded@vger.kernel.org, michael@free-electrons.com, Matt Mackall , matthew@wil.cx, linux-fsdevel@vger.kernel.org, akpm@linux-foundation.org Subject: Re: [patch 2/4] Configure out file locking features References: <20080731092703.661994657@free-electrons.com> <20080731093220.969460336@free-electrons.com> <20080731135319.GA20212@cs181140183.pp.htv.fi> <20080731162007.285938e0@surf> <20080731153757.GB20212@cs181140183.pp.htv.fi> <20080731182616.4c20f0db@surf> <20080731164918.GE20212@cs181140183.pp.htv.fi> In-Reply-To: <20080731164918.GE20212@cs181140183.pp.htv.fi> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-OriginalArrivalTime: 31 Jul 2008 17:29:27.0418 (UTC) FILETIME=[FB8B3DA0:01C8F332] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2623 Lines: 60 Adrian Bunk wrote: > And for embedded systems with which applications is it 100% safe to > disable this option? Sony's digital cameras. This option *is* disabled in the kernel for (most) Sony digital cameras. Those digital cameras have the kernel, busybox, a custom C library, and one proprietary application. The application does not use flock() (or AIO, or ethtool or multi-cast) These cameras were heavily tested, and are shipping now. I can't make any guarantees for other developers, but those of us who are careful about our application development would like the option to eliminate completely unused features from the kernel. (And the C library, but that's a different issue.) > And don't answer "doesn't use flock()", I want a real-life example of a > device where you could guarantee a developer that disabling this option > in his product would be safe. I'm not sure why a guarantee is required that other developers use this option safely. Maybe this is a point of disconnect between embedded folks and non-embedded folks. We're accustomed to making tradeoff decisions that only affect our product, and which we take full responsibility for testing. If warnings or support avoidance for the general population using such config options is the issue, I think that David Woodhouse's suggestion that such things could taint the kernel is an interesting idea. Maybe have we could have an "unsafe-config" taint flag? I should add that I am sympathetic with the larger issue you raise about nibbling at the bottom with patches that only address a few KB of the problem, while the size continues to build (to an even greater degree) with each release. My response is that I agree with you on the nibbling bit, but probably just at a different level of KB savings. That is, I presume you'd be OK with something that saved 100K or even 20K, but balk at bit at these patches, which save 10k or less. My threshold is lower (probably down to about 5K, so these are pretty close to the bubble), but even I wouldn't recommend applying anything much below that. We've already started considering to drop some linux-tiny patches that just don't save enough to warrant continued maintenance. -- Tim ============================= Tim Bird Architecture Group Chair, CE Linux Forum Senior Staff Engineer, Sony Corporation of America ============================= -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/