From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp2 ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms11 with LMTPS id A0ISCY19zV5oPAAA0tVLHw (envelope-from ) for ; Tue, 26 May 2020 20:35:25 +0000 Received: from aspmx1.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp2 with LMTPS id YNJpBI19zV4kcQAAB5/wlQ (envelope-from ) for ; Tue, 26 May 2020 20:35:25 +0000 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 81ED09402D1 for ; Tue, 26 May 2020 20:35:24 +0000 (UTC) Received: from localhost ([::1]:34578 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1jdgIF-0000Vu-DL for larch@yhetil.org; Tue, 26 May 2020 16:35:23 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:51364) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jdgI1-0000VZ-4q for guix-devel@gnu.org; Tue, 26 May 2020 16:35:09 -0400 Received: from dd26836.kasserver.com ([85.13.145.193]:53796) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jdgHt-0007jc-Sr for guix-devel@gnu.org; Tue, 26 May 2020 16:35:08 -0400 Received: from localhost (80-110-127-207.cgn.dynamic.surfer.at [80.110.127.207]) by dd26836.kasserver.com (Postfix) with ESMTPSA id D2CBD3365332; Tue, 26 May 2020 22:34:50 +0200 (CEST) Date: Tue, 26 May 2020 22:34:23 +0200 From: Danny Milosavljevic To: Brice Waegeneire Subject: Re: Kernel module configuration service Message-ID: <20200526223423.136e45b7@scratchpost.org> In-Reply-To: References: X-Mailer: Claws Mail 3.17.5 (GTK+ 2.24.32; x86_64-unknown-linux-gnu) MIME-Version: 1.0 Content-Type: multipart/signed; boundary="Sig_/8U/ZSfcC75aMfOGBAOLwkz7"; protocol="application/pgp-signature"; micalg=pgp-sha512 Received-SPF: none client-ip=85.13.145.193; envelope-from=dannym@scratchpost.org; helo=dd26836.kasserver.com X-detected-operating-system: by eggs.gnu.org: First seen = 2020/05/26 16:34:51 X-ACL-Warn: Detected OS = Linux 3.11 and newer [fuzzy] X-Spam_score_int: -25 X-Spam_score: -2.6 X-Spam_bar: -- X-Spam_report: (-2.6 / 5.0 requ) BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001 autolearn=_AUTOLEARN X-Spam_action: no action X-BeenThere: guix-devel@gnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: guix-devel@gnu.org Errors-To: guix-devel-bounces+larch=yhetil.org@gnu.org Sender: "Guix-devel" X-Scanner: scn0 Authentication-Results: aspmx1.migadu.com; dkim=none; dmarc=none; spf=pass (aspmx1.migadu.com: domain of guix-devel-bounces@gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=guix-devel-bounces@gnu.org X-Spam-Score: -1.11 X-TUID: ceo+DzrJ79Fd --Sig_/8U/ZSfcC75aMfOGBAOLwkz7 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Hi Brice, On Fri, 15 May 2020 19:31:51 +0000 Brice Waegeneire wrote: > (1) Generate a config directory for modrope to use > (2) Load loadable kernel module by extending 'kernel-module-loader-servic= e' [...] > ATM I need help with point number 1 in regard to putting in place the > config directory for modprobe. To do so I need to change > '%modprobe-wrapper' into a procedure to take the configuration directory= =20 > as > an argument, since the directory will now come from '/gnu/store/'=20 > instead > of '/etc/'. The problem is that the wrapper is currently put in place by > '%linux-bare-metal-service' which is an essential service, so it seems=20 > that > KMCS will have to become one too. I think that essential services are just services that aren't randomly restarted or removed by Guix while the system is running. Also, a user shouldn't need to touch (swap out) essential services. I envision that mostly other services would extend the KMCS--so it shouldn't matter that user can't touch the KMCS essential service. That said, maybe still good to have a field in the record that lets the user specify manual kernel module configuration amendments. The kernel module configuration directory should be there as early as possi= ble in the boot process since the kernel can invoke modprobe whenever it wants. Definitely don't wait for shepherd (or even more stuff) to start up. > service > most of them are straight forward and don't extend services like > 'kernel-module-loader-service-type' > (which itself extend > 'shepherd-root-service-type'). Oops. > What are the guidelines to add a service to the essential-services? Can > KMCS become an essential-service? Any other remarks/idea? If necessary one can always not do (2)--although it would be nice to do it. But if it means waiting for shepherd, nope. --Sig_/8U/ZSfcC75aMfOGBAOLwkz7 Content-Type: application/pgp-signature Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEds7GsXJ0tGXALbPZ5xo1VCwwuqUFAl7NfU8ACgkQ5xo1VCww uqWlcQf/QJiIgGWmbk2M6eSB7DV/Vo1E/KLl8RQ7c+VibKUV7NdRuhVXmjmNR0OF JpCmTlFrBYaUI+ZLH68A3YDIJZqIDW2rJntlU0YnOKMYDPKMegBB9Hib2VkLj3VQ ZswAflc6LcPrtVvUUs/vjGrZaJjoLl+mZhn5UsIX5IsFz2GP5BfMIee8yIzfsSPp N3R6FQus/oqdHU1+AseAF6+dfbkAs+LPcOjVLvMUilVb3JZ13jLLz0GDpgf9P5kj kE+sZxMV+9Yy/6dQEHBFuFFvu5bhj1Ayz8gONxaZXN7rukqR+fR1H/o5gcSKK6A/ OAlqTMRPxFE8jSBkGyeN5IwPPue9Mw== =5its -----END PGP SIGNATURE----- --Sig_/8U/ZSfcC75aMfOGBAOLwkz7--