Received: by 10.213.65.68 with SMTP id h4csp1014991imn; Thu, 22 Mar 2018 13:27:38 -0700 (PDT) X-Google-Smtp-Source: AG47ELsEa535+3WLbF1h86GylKeAkdL5R2IuwSJeBjyAKJpHoxcntMTsJ1zI1zCps0cvScjmTUYn X-Received: by 10.101.82.139 with SMTP id y11mr18981796pgp.68.1521750458037; Thu, 22 Mar 2018 13:27:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521750457; cv=none; d=google.com; s=arc-20160816; b=CLpBiVpcfbPcfxklHur0bkT6JWiJy9rDKZ0F2NkQXXniMkDWUtQdCwM4I/9swO7Uog XtQ2uMrX6XYKeCVjtHDXUjb1bc9CHLPWMQ5YY70IcnBITfm1B72oNzxlP3hANQlzNobF Qw2WvxnnhBj8v0OpvlN16S9QHQSEeg501IflxpnVjNC3yXhnTV88s2zYWgUs9yUWoBkB pKr6/ubnDjlvWP5VyDhrRdmXGxmQ5oAFk8I3+SKro3/VD8pwCWl4qjWv+hEr+qhq9csG rSJmmIcIsteOv1UZc8gW+f3+XszApmSbOkD8Z8cvRjGhKMhhUVu5jDjGAEReYWzAk4R5 B69w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=vxo1NVHz2mmJg6N7jWIYhb0RDgbmq69kn/m6G26gUio=; b=wkMD8c8yaAGmYui+hLVaANEjJfdZoLzjeZc9YHq8Oad/mAco9vMIBFoitA3i7RKEGt 8RMRb8CFWKrNnAnSkUuZKJ4Q5P/d9hJLppbHv2rHbfaXJkWy9Dxok+D8viMAFFVVdE9I YMMxYX8zFF7vVFzrok3eLR2eyUgO5wXioHvKGQLGnELMu0+3C0xo591c1avSgxcUtR4K 16xFMdcvRizxxhkEGccHmjFRsQIZ/T1MSOL+xSfS5v1k8zB3qvenF6f4QmdIMXYs+tQm iwfVHV34MgWosFJTAClGsfRxwa2hZpsm9/41Udf71vlR4cIV5/bhyX6BEC9xSJiTDBrX jWWQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m8si2653688pgr.85.2018.03.22.13.27.22; Thu, 22 Mar 2018 13:27:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751986AbeCVU0D (ORCPT + 99 others); Thu, 22 Mar 2018 16:26:03 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:45902 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751729AbeCVU0B (ORCPT ); Thu, 22 Mar 2018 16:26:01 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 8D128EAF; Thu, 22 Mar 2018 20:26:00 +0000 (UTC) Date: Thu, 22 Mar 2018 21:25:58 +0100 From: Greg Kroah-Hartman To: Guenter Roeck Cc: Brian Norris , Linux Kernel , stable , Leif Liddy , Matthias Kaehlcke , Daniel Drake , Kai-Heng Feng , Hans de Goede , Marcel Holtmann Subject: Re: [PATCH 4.4 095/108] Bluetooth: btusb: Restore QCA Rome suspend/resume fix with a "rewritten" version Message-ID: <20180322202558.GA28958@kroah.com> References: <20180216023147.GB69988@rodete-desktop-imager.corp.google.com> <20180216064850.GA26224@kroah.com> <20180216181043.GA84497@rodete-desktop-imager.corp.google.com> <20180216185220.GA29352@roeck-us.net> <20180217134351.GB28145@kroah.com> <20180217152459.GA22308@kroah.com> <20180322175251.GA24850@kroah.com> <20180322185635.GA4411@roeck-us.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180322185635.GA4411@roeck-us.net> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Mar 22, 2018 at 11:56:35AM -0700, Guenter Roeck wrote: > On Thu, Mar 22, 2018 at 06:52:51PM +0100, Greg Kroah-Hartman wrote: > > [ ... ] > > > > And that't the point to drive home here. If you stay away from updating > > to stable patches, you have a huge boatload of KNOWN SECURITY HOLES in > > your product. If you take them, you have the _possiblity_ of some bugs > > added, but overall, the rate is _VERY_ small. Guenter has numbers of > > 2-4 patches per year cause problems. That's lower than ANY other > > development model I have ever seen anywhere. > > > Unfortunately, people tend to be irrational. Yes, the regression rate I have > observed is in the 0.1..0.15% range for v4.4.y and v4.14.y. Yet, there are > still people who believe that we should not merge stable releases due to the > regressions it causes (though they are much less vocal nowadays). > > So, stick with known buggy/insecure devices? Or take the updates and > > handle the 1-2 problems a year they provide you. I think the > > cost-analysis is easy to make here :) > > > > Agreed, on an objective basis. Unfortunately, one does not get credit for > fixing bugs which have never been observed in the field because they have > been fixed before they showed up. But one _does_ get blame for regressions. Someone has half-way joked that they were going to turn an intern on the stable releases and get a CVE assigned for every patch in them. Just to highlight just how many "real" things we are fixing before anyone notices. Some days I think that is going to be the only way people pay attention :( > Even though there have been very few regressions in absolute numbers, the > default reaction to newly observed problems is "it must be due to a stable > release merge", even though it almost always turns out to be incorrect. > > The only way to deal with that is to reduce regressions to 0, or as close > to 0 as possible. 0.1% is good, but not good enough. For some platforms, it is 0%. Facebook has published numbers showing this for a 2 year run of stable kernel releases. When you start dealing with crazy embedded/odd hardware platforms, the numbers does go up, just because no one is testing those platforms before I do a release. Hence the push to do the testing on the real hardware, which is why kernel.ci and Linaro are now doing this. If you note, we also have people doing merges on their phones, and I get private emails from a number of SoC companies showing that their merge/test cycle worked as well. And one note from that SoC testing, in the past 6 months since it has started, I have _NO_ reported regressions on any stable release so far. Not bad... > Also, while I agree that we are much better off in respect to security, > the verdict is still out if stable release merges actually improve release > stability; I don't see a clear trend even with chromeos-4.4. Of course, > it is all but impossible to say if this is due to 4.4.y or due to the > 13,000+ patches we have on top of v4.4.y in chromeos-4.4. Yeah, _THATS_ the major issue here. The interaction of the 3+million lines of out-of-tree crazyness in device trees still scares me. But, as the SoCs are now reporting, so far it's going well, but it's only been 6 months. But it has been an "interesting" 6 months :) As for "improve" stability, well, given that we are fixing known-root-holes, yes, that does increase stability. Again, I can crash any phone shipping today except for 2 of them, because those 2 updated to newer kernel versions. Do I need to start publishing reproducers? Actually, along those lines, I have seen people start putting tests for reported kernel bugs into some regression tests. When those start being more popular (i.e. people start running them on devices that are not updated), then you will start to see the reports of "instability". Oh well, back to patch reviewing, I'm preaching to the choir here... thanks, greg k-h