Received: by 10.213.65.68 with SMTP id h4csp590837imn; Wed, 28 Mar 2018 09:05:44 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/FZMBVIiYQJ4ksvOgoQxcB3WEolf8i/Q/5zb8pamfT5qgkF53i1YTlQmfKCYas2MP77K76 X-Received: by 2002:a17:902:744c:: with SMTP id e12-v6mr2419653plt.382.1522253144819; Wed, 28 Mar 2018 09:05:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522253144; cv=none; d=google.com; s=arc-20160816; b=GzIWkDEErO0omXxw+L2919B2zi+MCDAEudskUyfciOv8BS0R0DA9id6+ou4oDpk90q cGslzDr5vrvq88FNu3rlsE6RHvrLgUDpQYgq//ShPRhMfguGwZTPfhzv6vgWdRrsEuIL ZJGRfOasOAEmeUSt5XscteJpDDsJSpSfmYeyVvF2xSwZGA8JszBixXfzk2vQG2Fd90lj aKB/SjFiZUdimDqVO1n40qesFeINKEKFyfqoWqzWrMkwMivbvOFm4KQUDVoOeMzUp6w4 9jOjJvB2RMKAArzroqGg//kl0cSJj3Uds3JaKXfTXaodIA4+PkYO/1kkbR6c+8O7l9nt rNMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=Okic+DY9ATMIIb0bIAsCg4VFPK95ttj0plVIj3e8hN8=; b=snGqBxGsIlVHFp5ha+N/qLntQ7sjIV87f/+cX84eRv27RE4AFwnyjAkNUp1hwUbhqc /EB7k73iDMXxOujR6yHenSSnx+q7jqI5zYcRMAt1Xy0dNGi/guUbkobK22zl88/FXpai XyjVQ68pafQROl7zWRw9Xdxs2dTtU0YOePMgem4u+V7VHwUEcal0t2+JziiIJe621SZ/ TNGq4um6H/nZgeyPitjfXQ1mrG59xMGJbRgA3WvyUiC9UGez7vI3USbfM0C+TT+WDfDy uos5sRZ28ukU/17vFk5aLbTdDQZUNYS8nOnDOjgFPhDYahIUWKSAk+qycpQhgMsko/H9 n0Rw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u190si2661719pgc.532.2018.03.28.09.04.45; Wed, 28 Mar 2018 09:05:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753455AbeC1NUu (ORCPT + 99 others); Wed, 28 Mar 2018 09:20:50 -0400 Received: from mx2.suse.de ([195.135.220.15]:56351 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752782AbeC1NUs (ORCPT ); Wed, 28 Mar 2018 09:20:48 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 2C852AF00; Wed, 28 Mar 2018 13:20:46 +0000 (UTC) Date: Wed, 28 Mar 2018 15:20:44 +0200 From: Michal Hocko To: Sasha Levin Cc: Sasha Levin , Dave Chinner , "Luis R. Rodriguez" , "Darrick J. Wong" , Christoph Hellwig , xfs , "linux-kernel@vger.kernel.org List" , Greg Kroah-Hartman , Julia Lawall , Josh Triplett , Takashi Iwai , Joerg Roedel Subject: Re: [PATCH] xfs: always free inline data before resetting inode fork during ifree Message-ID: <20180328132044.GM9275@dhcp22.suse.cz> References: <20171123060137.GL2135@magnolia> <20180323013037.GA9190@wotan.suse.de> <20180323034145.GH4818@magnolia> <20180323170813.GD30543@wotan.suse.de> <20180323172620.GK4818@magnolia> <20180323182302.GB9190@wotan.suse.de> <20180325223357.GJ18129@dastard> <20180327070637.GX5652@dhcp22.suse.cz> <20180328011152.GA7561@sasha-vm> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180328011152.GA7561@sasha-vm> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 28-03-18 01:11:55, Sasha Levin wrote: > On Tue, Mar 27, 2018 at 09:06:37AM +0200, Michal Hocko wrote: > >On Mon 26-03-18 19:54:31, Sasha Levin wrote: > >[...] > >> About half a year ago. I'm not sure about the no visibility part - > >> maintainers and authors would receive at least 3 mails for each patch > >> that got in this way, and would have at least a week (usually a lot > >> more) to object to the inclusion. Did you not receive any mails from > >> me? > > > >Well, I was aware of your emails yet my free time didn't really allow me > >to follow those patch bombs. I responded only when some email subject > >hit my eyes as being non-stable candidate. So by no means the MM > >backports were reviewed by me. And considering how hard it is to get any > >review for MM patches in general I strongly suspect that others didn't > >review either. > > Being aware is different than saying it was snuck in without anyone > knowing. Well, you have to realize that we are receiving tons of emails and if there are large piles appearing in my inbox I tend to delete them all if they fall into certain pattern categories. But just to be absolutely clear. I do not want to accuse anybody from sneaking changes into the stable tree behind maintainers backs. > > >In general I am quite skeptical about the automagic backports > >selections, to be honest. MM patches should be reasonably good at > >selecting stable backports and adding more patches on top just risks > >regressions. > > Okay, let's take mm/ as a subsystem that is doing a good job with > submitting stuff to -stable. > > There were 40 patches in total going into the 4.14 LTS tree that touched > mm/. Out of those, 5 were selected via the "automagic" process: > > > 647a37ec1a17 mm/frame_vector.c: release a semaphore in 'get_vaddr_frames()' > > d91c3f2e540f mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep > > b2ba0bd34695 kmemleak: add scheduling point to kmemleak_scan() > > 5ca94e03675a slub: fix sysfs duplicate filename creation when slub_debug=O > > 342ee8775800 mm, x86/mm: Fix performance regression in get_user_pages_fast() > > The only "questionable" one here I see is the performance regression > one, which I decided to keep in because it's a rather severe one in a > common code path. > > Even good subsystems might sometimes miss a patch or two. Ohh, absolutely. But if anybody is going to hit the issue, it would be easier to spot with the upstream kernel having the fix already. Most of above patches have good chance of never being hit or at least not that harmful. > But yes, I've received less response from maintainers than I expected, > so I'll switch it to an opt-in model for new patches that go upstream. OK, that would certainly be more conservative and to some degree safer. I have had that feeling that stable simply has to rely on maintainers others we are operating on the pure luck mode. Just the fact that the patch applies doesn't mean it is correct to be backported and it is out of reasonable to expect stable tree maintainers to evaluate that. So as much as I appreciate the work you and others are doing (the automagic part is actually and interesting concept for sure) the less is sometimes more... -- Michal Hocko SUSE Labs