From owner-svn-src-all@FreeBSD.ORG Tue Feb 10 00:10:47 2015 Return-Path: Delivered-To: svn-src-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id F2759B86; Tue, 10 Feb 2015 00:10:46 +0000 (UTC) Received: from smtp2.ore.mailhop.org (smtp2.ore.mailhop.org [54.186.57.195]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id CE9C76B7; Tue, 10 Feb 2015 00:10:46 +0000 (UTC) Received: from [73.34.117.227] (helo=ilsoft.org) by smtp2.ore.mailhop.org with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.82) (envelope-from ) id 1YKy5f-0000fS-Q6; Mon, 09 Feb 2015 23:50:07 +0000 Received: from revolution.hippie.lan (revolution.hippie.lan [172.22.42.240]) by ilsoft.org (8.14.9/8.14.9) with ESMTP id t19No5Pe076407; Mon, 9 Feb 2015 16:50:05 -0700 (MST) (envelope-from ian@freebsd.org) X-Mail-Handler: DuoCircle Outbound SMTP X-Originating-IP: 73.34.117.227 X-Report-Abuse-To: abuse@duocircle.com (see https://support.duocircle.com/support/solutions/articles/5000540958-duocircle-standard-smtp-abuse-information for abuse reporting information) X-MHO-User: U2FsdGVkX19jA7uzpC89wFVU1bjB6EGO Message-ID: <1423525805.16794.24.camel@freebsd.org> Subject: Re: svn commit: r278479 - in head: etc sys/kern From: Ian Lepore To: Benjamin Kaduk Date: Mon, 09 Feb 2015 16:50:05 -0700 In-Reply-To: References: Content-Type: text/plain; charset="us-ascii" X-Mailer: Evolution 3.12.8 FreeBSD GNOME Team Port Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Cc: "svn-src-head@freebsd.org" , "svn-src-all@freebsd.org" , "src-committers@freebsd.org" , Rui Paulo , Rui Paulo X-BeenThere: svn-src-all@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "SVN commit messages for the entire src tree \(except for " user" and " projects" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 10 Feb 2015 00:10:47 -0000 On Mon, 2015-02-09 at 18:29 -0500, Benjamin Kaduk wrote: > On Mon, Feb 9, 2015 at 6:22 PM, Rui Paulo wrote: > > > On Feb 09, 2015, at 03:16 PM, Benjamin Kaduk wrote: > > > > > > What advantage does putting this in devd have over a standalone daemon for > > crash reporting? Is it just the ease of implementation to leverage the > > existing infrastructure? > > > > > > Well, I want to automatically inspect all the programs that crashed in a > > given system. I don't see how you can do that with a standalone daemon. > > Or maybe I didn't understand what you meant. > > > > I think you have misunderstood what I was trying to ask. > > We could in principle write a new daemon, call it crash-reporterd for now, > and have the kernel notify that daemon whenever any program on the system > crashes. But writing the infrastructure to support that would be a bunch > of work, and we already have devd set up to get notifications from the > kernel, so it is much faster to implement crash reporting in devd, even > though crashes in software have nothing to do with device changes. > > The question boils down to: is the time saved by implementing it this way > worth the tradeoff of architectural purity. > > I don't have an opinion myself, I just want to make sure the question is > considered. > > -Ben Truth be told, it kind of bugs me. I think adding this to devctl and devd is inappropriate without also renaming those components to reflect their new role, and rewriting the manpages to reflect what they actually do now. If you ponder for a moment what the new role seems to be (generic notification to userland of events happening in the kernel), you end up with names like "keventd" and that makes you wonder whether a new type of knote for kevent, listened for by a new crashd app, would be better. -- Ian