White paper: Vendor Kernels, Bugs and Stability
White paper: Vendor Kernels, Bugs and Stability
Posted May 17, 2024 14:28 UTC (Fri) by willy (subscriber, #9762)In reply to: White paper: Vendor Kernels, Bugs and Stability by bluca
Parent article: White paper: Vendor Kernels, Bugs and Stability
Posted May 17, 2024 14:55 UTC (Fri)
by bluca (subscriber, #118303)
[Link] (4 responses)
I mean we change public interfaces like this in systemd too every now and then - but we just keep the old configuration option around too, undocumented, and either map it to the new one if any, or make it a no-op.
Posted May 17, 2024 15:06 UTC (Fri)
by mb (subscriber, #50428)
[Link] (3 responses)
Posted May 17, 2024 15:17 UTC (Fri)
by bluca (subscriber, #118303)
[Link] (2 responses)
Posted May 17, 2024 16:14 UTC (Fri)
by mb (subscriber, #50428)
[Link] (1 responses)
No. It depends on the change itself whether a silent ignore is better or not. It might be worse to silently ignore something the user has requested.
Posted May 17, 2024 16:22 UTC (Fri)
by bluca (subscriber, #118303)
[Link]
Posted May 17, 2024 16:20 UTC (Fri)
by joib (subscriber, #8541)
[Link] (6 responses)
Posted May 17, 2024 16:53 UTC (Fri)
by adobriyan (subscriber, #30858)
[Link] (5 responses)
Posted May 18, 2024 19:46 UTC (Sat)
by NYKevin (subscriber, #129325)
[Link] (4 responses)
0. /etc/fstab is a configuration file. It's not the kernel's place to modify config files (software like Puppet or Ansible will change it back).
(No, paging the sysadmin at 3 AM is not a reasonable response to this situation. Nothing is actually broken!)
Posted May 18, 2024 20:29 UTC (Sat)
by adobriyan (subscriber, #30858)
[Link] (1 responses)
I know, relax :-) it was a joke.
Posted May 19, 2024 4:01 UTC (Sun)
by wtarreau (subscriber, #51152)
[Link]
Posted May 19, 2024 9:07 UTC (Sun)
by smurf (subscriber, #17840)
[Link] (1 responses)
Posted May 20, 2024 17:35 UTC (Mon)
by NYKevin (subscriber, #129325)
[Link]
Which is also, sort of, the point I'm trying to make here. It is no longer accurate to divide userspace into "applications" and "stuff the sysadmin manually fiddles with." Sysadmins are not manually fiddling with mount options etc. these days. That's all managed by some other piece of software that isn't "the application," but can still break and cause problems all the same. E.g. k8s, Puppet, Docker, etc.
Posted May 18, 2024 17:11 UTC (Sat)
by shemminger (subscriber, #5739)
[Link]
Posted May 19, 2024 4:00 UTC (Sun)
by wtarreau (subscriber, #51152)
[Link]
White paper: Vendor Kernels, Bugs and Stability
White paper: Vendor Kernels, Bugs and Stability
White paper: Vendor Kernels, Bugs and Stability
White paper: Vendor Kernels, Bugs and Stability
White paper: Vendor Kernels, Bugs and Stability
White paper: Vendor Kernels, Bugs and Stability
White paper: Vendor Kernels, Bugs and Stability
White paper: Vendor Kernels, Bugs and Stability
1. Assuming you meant /etc/mtab, that's (usually) managed in userspace. It's also none of the kernel's business.
2. Assuming you meant /proc/mounts, there might be some userspace software that parses it and compares it against what it "should" look like, and misbehaves if a random mount option is missing (e.g. gets stuck in a hot loop of repeatedly remounting the device with the "correct" mount options, fires an alert and tells the sysadmin to come running, etc.).
White paper: Vendor Kernels, Bugs and Stability
White paper: Vendor Kernels, Bugs and Stability
White paper: Vendor Kernels, Bugs and Stability
White paper: Vendor Kernels, Bugs and Stability
White paper: Vendor Kernels, Bugs and Stability
Easier to just silently sweep legacy under the rug, and get on with fixing real issues.
White paper: Vendor Kernels, Bugs and Stability
