On Tue, 2 Jul 2013 10:36:34 +0300
Sergei Trofimovich <sly...@gentoo.org> wrote:

> What upstream do you plan to report bugs when user possibly mixes
> all of it in one mess? Each of those is known to be unstable. The mix
> is just a disaster.

They used to do this to us and to kernel upstream before. Why? Because
we are unaware. The users just applied their patches, forget about them
when they experience problems; then they come and file a bug without
us knowing they do use these. Thus we'll ask for a .config and any
separate patches the user applied from now on.

The mix is just a disaster, but that's up to the user whether he wants
to go for such disaster; the patches are guarded using an experimental
USE flag and menu config option, if you enable both, you can't expect
everything to work fine. Well, maybe it does, if you sparingly enable
one or two patches but not all of them.

> Is gentoo's kernel team able to resolve user's OOpsen?

When patches are applied, we can ask them to try to reproduce it without
patches; unless, it is clear from the BUG that an experimental patch is
at cause. If they consistently get a BUG with a patch, we can send these
users to report this at the patch author; basically we act as a filter
before sending these reports upstream. And yes, we do try to resolve
some of these on our own.

> > Meet CONFIG_DEVTMPFS; forget to enable it, greet a failing boot.
> > We're telling users to enable it in some places, in the handbook
> > it's a single line you must read, on the Wiki it's kind of missing
> > unless you are luckily on the right page, on the Quick Install book
> > it is missing too.
> 
> Forbid users install udev to ROOT=/ if running kernel does not
> support devtmpfs (easy to check by /proc/filesystems)

But udev comes as part of stage 3 tarball; so, we would have to change
the whole way of installing a system. I think opting to enable it by
default for Gentoo kernel sources is a better / less invasive approach.

-- 
With kind regards,

Tom Wijsman (TomWij)
Gentoo Developer

E-mail address  : tom...@gentoo.org
GPG Public Key  : 6D34E57D
GPG Fingerprint : C165 AF18 AB4C 400B C3D2  ABF0 95B2 1FCD 6D34 E57D

Attachment: signature.asc
Description: PGP signature

Reply via email to