Content-Length: 24576 | pFad | http://lwn.net/Articles/186427/

What's not going into 2.6.18 [LWN.net]
|
|
Subscribe / Log in / New account

What's not going into 2.6.18

The 2.6.17 development cycle is coming to an end, with the final release likely to happen before the middle of June. So, naturally, the attention of the kernel developers is turning toward the 2.6.18 cycle. As a way of encouraging thought on what should happen then, Andrew Morton has posted a 2.6.18 merge plan summary describing how he expects to dispose of the patches currently sitting in the -mm tree. There has been occasional talk of doing a bugfix-only kernel cycle, but it's clear that 2.6.18 won't be that cycle - there are a lot of patches tagged for merging.

The features which are expected to be merged are interesting, but they are best discussed once they hit the mainline repository; until then, their fate remains uncertain. So, for now, suffice to say that 2.6.18 will likely include an S/390 hypervisor filesystem, a number of memory management patches, some software suspend improvements, a new i386 hardware clock subsystem, some SMP scheduler improvements, the swap prefetch patches (maybe), priority-inheriting futexes, a rework of the /proc/pid code, a number of MD (RAID) improvements, a new kernel-space inotify API, and a bunch of code from subsystem trees which does not appear in -mm directly. As is usual, a great deal of code will be flowing into the mainline for the next release.

It can also be interesting to look at what will not be merged. From Andrew's posting, the following big patch sets are likely to be held back:

  • There is a great deal of code which requires action by various subsystem maintainers. But, says Andrew, "I continue to have some difficulty getting this material processed." He will step up his efforts to get responses from maintainers, but some patches will likely continue to languish.

    In particular, some dismay has been expressed regarding how long it can take to get drivers into the mainline. It seems that, perhaps, the quality bar is being set too high. It is always possible to find things to criticize in a body of code, but sometimes the best thing to do is to proceed with the code one has and improve it as part of an ongoing process. There is concern that reviewers are insisting on perfection and keeping out code which is good enough, and which could be of value to Linux users.

  • The acx100 driver supports a useful range of wireless chipsets. Unfortunately, there are some concerns about how this driver was developed and whether its inclusion could cause legal problems for Linux. Until that issue is resolved, this driver is likely to remain out in the cold.

  • The per-task delay accounting patches are sitting on the edge. The main concern here appears to be that these patches create a new interface for getting per-task information from the kernel. Any other new code which exports that sort of information (and a number of patches exist) will be expected to use this new API. So more review and discussion may be called for here. There is also a separate patch set for non-task-oriented statistics which will probably not be merged this time around for the same reason.

  • eCryptfs is uncertain as well. This filesystem implements its own mechanism for stacking on top of a base filesystem, but the primary reviewer would rather see the creation of a generic stacking layer for all to use. This is an issue which is often encountered by people trying to do new things; they are asked to make their infrastructure more generic. The intent is good, but it can cause delays and extra work for developers trying to add new features.

  • The UTS namespaces patch. This patch, which implements a small part of the container concept, is not particularly useful on its own. So it will probably wait until more of the container infrastructure is in place.

  • The adaptive readahead patches are deemed to be too young for now. Some benchmark results show significant performance improvements from these patches, but others are less clear.

  • Reiser4. Says Andrew: "We need to do something about this. It does need an intensive review and there aren't many people who have the experience to do that right, and there are fewer who have the time. Uptake by a vendor or two would be good." This filesystem has been waiting on the sidelines for a very long time, and no prospective merge is yet in sight.

  • The generic IRQ code is said to be "still stabilizing" and more likely to be merged in 2.6.19. That is also the case for the lock validator.

All of this is subject to change when the merge window actually opens. Developers are making cases for specific patches; Ingo Molnar is asking for reconsideration of the generic IRQ and lock validator patches, for example. Watch this space in the coming weeks to see what really happens.
Index entries for this article
KernelDevelopment model


to post comments

Personal thoughts of Reiser 4 and the Kernel

Posted Jun 8, 2006 2:52 UTC (Thu) by pr1268 (subscriber, #24648) [Link] (4 responses)

I think it's sad that the Reiser 4 FS code continues to sit and simmer. Granted, I realize how much difficulty Hans', Vladimir Savelijev's, and the fellow Reiser 4 developers' code has given the Kernel developers - I do respect the developers' high standards - but I also agree with Andrew that it can't sit much longer.

Does this whole debate (going on since 2003?) about Reiser 4 and the Linux Kernel truly espouse the philosophies of open source? Or, am I blind to part of this debate?

Thank you for allowing me to share my thoughts.

Personal thoughts of Reiser 4 and the Kernel

Posted Jun 8, 2006 5:09 UTC (Thu) by cventers (guest, #31465) [Link] (3 responses)

Unfortunately I think Reiser4 has been held back by a bit of politics on
both sides. My observation is that Hans and his team are brilliant, and so
are many of the kernel people that object, and since there has been heat
in the past, well - you probably get where I'm going with this.

I wonder what the remaining complaints are at this point. If it's just
stylistic I'd say that it's silly to keep it out as it's a filesystem (not
a piece of core code). If people aren't getting hit with panics or data
munching bugs, and the code is reasonably good, why has it been held up
for _so_ long?

Personal thoughts of Reiser 4 and the Kernel

Posted Jun 8, 2006 7:39 UTC (Thu) by Los__D (guest, #15263) [Link] (2 responses)

If it's just stylistic I'd say that it's silly to keep it out as it's a filesystem (not a piece of core code).

Wasn't one of the gripes that it touches major pieces of the core VFS, not just it's own? If it's still so, I can see a VERY good reason to be perfectionist about this.

It's quite a while since I followed the discussion though, so they might already have been forced to pull the VFS parts out.

Personal thoughts of Reiser 4 and the Kernel

Posted Jun 8, 2006 9:11 UTC (Thu) by cventers (guest, #31465) [Link] (1 responses)

I think you may be misremembering this a bit. To my recollection, one of
the key friction points was that reiser4 developed this whole new concept
of plugins, which was _very_ similar to the VFS. Kernel developers don't
want abstraction layers hanging off of abstraction layers. So it really
wasn't that they were abusing the VFS, it was just that they were building
their own VFS under the VFS.

It was suggested that they take the differences in their plugin system and
build those capabilities into the VFS itself, so that it would be
available to every filesystem.

I'm not sure what the status of the code is these days. I would imagine
that enough time has gone by that many of these things have been
addressed, and reiser4 is probably a lot closer to being ready for
mainline (if it isn't already).

Personal thoughts of Reiser 4 and the Kernel

Posted Jun 8, 2006 17:08 UTC (Thu) by Los__D (guest, #15263) [Link]

*plonk*

Yep, it was that way around! :)

some dismay has been expressed

Posted Jun 8, 2006 16:40 UTC (Thu) by wilck (guest, #29844) [Link] (2 responses)

In particular, some dismay has been expressed regarding how long it can take to get drivers into the mainline.

Does anyone have link (thread)?

some dismay has been expressed

Posted Jun 8, 2006 17:43 UTC (Thu) by corbet (editor, #1) [Link]

The quote of the week is from that thread. The starting point would appear to be this note from Jeff Garzik.

some dismay has been expressed

Posted Jun 16, 2006 21:23 UTC (Fri) by gdamjan (subscriber, #33634) [Link]

The chicken or egg problem with new drivers in kernel code (drivers don't get enough testing when outside of the tree, kernel devs don't trust code that's not been used) can be solved by easying the process of appling outside patches for early adopters.

For example, for kernels I compile for desktop/laptop use I don't care if I integrate some exeperimental wifi drivers. But the manual proces of searching for patches, applying them, recompilling, not forgetting to compile for each kernel version etc.. is really hard.

What would be great if there's a repository of 'for testing' patches, that would be liberal about who&how can put patches there. And an integrated method in the kernel-build-proccess to pull and apply those patches. I think git should be pretty good at cherry-picking patches? The info about which patches were added should be saved in .config, so I would only need that one file in any kernel-source, run 'make update' - get's the testing but also -stable patches, make oldconfig and make to have the latest stable kernel with the latest testing patches.

This should really be part of the kernel(-build-process).


Copyright © 2006, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds









ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://lwn.net/Articles/186427/

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy