Received: by 10.192.165.156 with SMTP id m28csp810176imm; Mon, 16 Apr 2018 09:04:00 -0700 (PDT) X-Google-Smtp-Source: AIpwx48E8y94TmtyCkXM4gVzae4pIp+XIqNbo7xCVDEb+HyYk2uv2n7hewNO6bjU+7H9P/L25JsJ X-Received: by 10.101.93.14 with SMTP id e14mr13394841pgr.353.1523894640120; Mon, 16 Apr 2018 09:04:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523894640; cv=none; d=google.com; s=arc-20160816; b=Cpk5KtXvu6WltuB0alS9AC2GDIFR9p/Cronw+WIuxe5AmTSq5KLX3fDBnwJhmo8ooW 9aST6OHCYEPgdB6dkA8sucCXWssm4A/H1gxle7O33a5L+IjyRNP/q2jZ9u7pM/aob2Lp 9bIUBKlk96vFOAAJDr7VUOVmv+BkJSKblHsp7iYHPHKtTyu+dAeJ4cLLgaiEa3bAtQvn 26uSpf3qEoz2M//15+aOEt+n80021TtULFB/McCNanu84jgs6h6EEOe8exXp0gCurRB6 h89CctqwnjYiJLZvlHkBmPUjxdoxOpGf+OgAjtsQZCFurpUT38q7bMo1SQAOq8FtxjZQ KIqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-id:spamdiagnosticmetadata:spamdiagnosticoutput :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=bVlmiGgo9lE8Yybu06TsWmNLBhGu+XrtCtfxvoTa7/A=; b=wT8Y3cfYVptZDXL5bIf/MU8E5xzF9H2mmTurINjKdxOlARCXaPTfkTAK0F5prBOknP z+bKRfbFeNJHKPndeeO9sT7xOW2EB6zpNgadqqxcZvrrIthO4s4zxk6QgGf88XNET4qK 4065+TAb1sIM0vueXTJW3LwUkDGxUxMcKiNmOR16PiT6MGVAONWIPgdO0lu49lui/+A/ GbPuY6JzPORp9tgb5aIlzxOwa194dQLGD5v8FV1e3vBGXxRqNW/l+asQjynYIWjnnkAz z9oJh7jvgx9sXNwcnW6rwB7fOEBi/tleagHAILTLb1axsLFpJXhrOS/EjF/lPttvhkYM buLA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@microsoft.com header.s=selector1 header.b=J2gsYi4j; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 15-v6si5031470pla.59.2018.04.16.09.03.45; Mon, 16 Apr 2018 09:04:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@microsoft.com header.s=selector1 header.b=J2gsYi4j; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752944AbeDPQCJ (ORCPT + 99 others); Mon, 16 Apr 2018 12:02:09 -0400 Received: from mail-bl2nam02on0126.outbound.protection.outlook.com ([104.47.38.126]:23166 "EHLO NAM02-BL2-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752609AbeDPQCG (ORCPT ); Mon, 16 Apr 2018 12:02:06 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=bVlmiGgo9lE8Yybu06TsWmNLBhGu+XrtCtfxvoTa7/A=; b=J2gsYi4j6rvmNCGgIwDqL2Zig2uWirQ5VyTUdaHslAVUXjWLm/irdDezp729M632Pwcko/ATNQEBl/r5h+WnwV5TeQra2qn4LMhvjbrSm3s7WI7qUCs+LAW4M1dcOxGkVgIJn3vQsjwH+GCyyh/e/Raoo6AeH4aDaT1TFe9+UHk= Received: from DM5PR2101MB1032.namprd21.prod.outlook.com (52.132.128.13) by DM5PR2101MB1030.namprd21.prod.outlook.com (52.132.128.11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.715.4; Mon, 16 Apr 2018 16:02:03 +0000 Received: from DM5PR2101MB1032.namprd21.prod.outlook.com ([fe80::8109:aef0:a777:7059]) by DM5PR2101MB1032.namprd21.prod.outlook.com ([fe80::8109:aef0:a777:7059%2]) with mapi id 15.20.0715.004; Mon, 16 Apr 2018 16:02:03 +0000 From: Sasha Levin To: Steven Rostedt CC: Linus Torvalds , Petr Mladek , "stable@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "akpm@linux-foundation.org" , "linux-mm@kvack.org" , Cong Wang , Dave Hansen , Johannes Weiner , Mel Gorman , Michal Hocko , Vlastimil Babka , Peter Zijlstra , Jan Kara , Mathieu Desnoyers , Tetsuo Handa , Byungchul Park , Tejun Heo , Pavel Machek Subject: Re: [PATCH AUTOSEL for 4.14 015/161] printk: Add console owner and waiter logic to load balance console writes Thread-Topic: [PATCH AUTOSEL for 4.14 015/161] printk: Add console owner and waiter logic to load balance console writes Thread-Index: AQHTz5h7IvK2v80d0k6VVqDoPwJEM6P4GK8AgAnYKwCAAX5DAIAAHfKAgAAFIICAAAchAA== Date: Mon, 16 Apr 2018 16:02:03 +0000 Message-ID: <20180416160200.GY2341@sasha-vm> References: <20180409001936.162706-1-alexander.levin@microsoft.com> <20180409001936.162706-15-alexander.levin@microsoft.com> <20180409082246.34hgp3ymkfqke3a4@pathway.suse.cz> <20180415144248.GP2341@sasha-vm> <20180416093058.6edca0bb@gandalf.local.home> <20180416113629.2474ae74@gandalf.local.home> In-Reply-To: <20180416113629.2474ae74@gandalf.local.home> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [52.168.54.252] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;DM5PR2101MB1030;7:vUgOEf0gAHuRctq+UcW22EFpoYIk/JQ6I829N3P6x4q5XB18lv0w5P3kyciXcZIJDP42GqvXRt/bUhVLWR6wGL3gyKUXQiF/Ky6p6941KEg3wtrXfs0WaaBWZmdqt8/wO+DyuuNmvjP0kiV3NCpn1yhAbnUU5RqjI/94wed3xPYuZacCJN847SRewfv5Fhj1aFO0ILExgWENr33V/I4ZG7Nj6/Ms0dZpk9BcucxUmuckoMIW5aCceOt5voKFcbkv;20:LKSU8XTk+M8e63BYyqfRb8cO3fHqze+X0EmW+mNfJpBXwYxSRQM7FaViFvFZEyiM4wLMyPETJFiixNlRj3Bt2hiOQ7km+Scow0a67qlof9APreDrJwu1euyMsdyWO/Wckj6qZT421fkrZjSUFDBbr31ZBZCsxkXLm4nzxdsCGSA= x-ms-exchange-antispam-srfa-diagnostics: SOS; x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(7020095)(4652020)(48565401081)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7193020);SRVR:DM5PR2101MB1030; x-ms-traffictypediagnostic: DM5PR2101MB1030: authentication-results: spf=none (sender IP is ) smtp.mailfrom=Alexander.Levin@microsoft.com; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:; x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(8211001083)(61425038)(6040522)(2401047)(8121501046)(5005006)(3002001)(3231232)(944501347)(52105095)(10201501046)(93006095)(93001095)(6055026)(61426038)(61427038)(6041310)(20161123562045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123564045)(6072148)(201708071742011);SRVR:DM5PR2101MB1030;BCL:0;PCL:0;RULEID:;SRVR:DM5PR2101MB1030; x-forefront-prvs: 0644578634 x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(7916004)(396003)(346002)(376002)(366004)(39380400002)(39860400002)(189003)(199004)(54094003)(11346002)(316002)(446003)(2906002)(22452003)(7736002)(6506007)(2900100001)(53546011)(66066001)(105586002)(97736004)(33716001)(10090500001)(478600001)(305945005)(476003)(81156014)(86362001)(81166006)(14454004)(33896004)(8676002)(6916009)(54906003)(102836004)(3280700002)(486006)(10290500003)(3660700001)(99286004)(93886005)(25786009)(4326008)(26005)(39060400002)(33656002)(7416002)(6436002)(5660300001)(86612001)(6246003)(186003)(72206003)(53936002)(106356001)(1076002)(76176011)(68736007)(6116002)(8936002)(6486002)(9686003)(229853002)(3846002)(6512007)(5250100002)(217873001);DIR:OUT;SFP:1102;SCL:1;SRVR:DM5PR2101MB1030;H:DM5PR2101MB1032.namprd21.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;MX:1;A:1; received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts) x-microsoft-antispam-message-info: qhoDCrYgKF917kAlJKGMM194xLSOQQ3ylIaoc0NJc1cnV0cJnD7EOip1uZE6QBzg+G/CkOrvvuvBtZlW+Vl3TnFV2iKAAsAYyvfW9QfLRYjiCGAocMJJsrL4oDBpFG1RV6JOMzMTm6Qs9gZDUzOknDK5whf1lUffFv/MkyHiKIDgQaom4RHuY/J1sUxmmwMJ spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: 564008d1-e9ef-4a2b-a1a4-08d5a3b36524 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-Network-Message-Id: 564008d1-e9ef-4a2b-a1a4-08d5a3b36524 X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Apr 2018 16:02:03.2785 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR2101MB1030 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 16, 2018 at 11:36:29AM -0400, Steven Rostedt wrote: >On Mon, 16 Apr 2018 08:18:09 -0700 >Linus Torvalds wrote: > >> On Mon, Apr 16, 2018 at 6:30 AM, Steven Rostedt wr= ote: >> > >> > I wonder if the "AUTOSEL" patches should at least have an "ack-by" fro= m >> > someone before they are pulled in. Otherwise there may be some subtle >> > issues that can find their way into stable releases. >> >> I don't know about anybody else, but I get so many of the patch-bot >> patches for stable etc that I will *not* reply to normal cases. Only >> if there's some issue with a patch will I reply. >> >> I probably do get more than most, but still - requiring active >> participation for the steady flow of normal stable patches is almost >> pointless. >> >> Just look at the subject line of this thread. The numbers are so big >> that you almost need exponential notation for them. >> > >I'm worried about just backporting patches that nobody actually looked >at. Is someone going through and vetting that these should definitely >be added to stable. I would like to have some trusted human (doesn't >even need to be the author or maintainer of the patch) to look at all >the patches before they are applied. I do go through every single commit sent this way and review it. Sometimes things slip by, but it's not a fully automatic process. Let's look at this patch as a concrete example: the only reason, according to the stable rules, that it shouldn't go in -stable is that it's longer than 100 lines. Otherwise, it fixes a bug, it doesn't introduce any new features, it's upstream, and so on. It had some fixes that went upstream as well? Great, let's grab those as well. >I would say anything more than a trivial patch would require author or >sub maintainer ack. Look at this patch, I don't think it should go to >stable, even though it does fix issues. But the fix is for systems >already having issues, and this keeps printk from making things worse. >The fix has side effects that other commits have addressed, and if this >patch gets backported, those other ones must too. Sure, let's get those patches in as well. One of the things Greg is pushing strongly for is "bug compatibility": we want the kernel to behave the same way between mainline and stable. If the code is broken, it should be broken in the same way. If anything, after this discussion I'd recommend that we take this patch and it's follow-up fixes... >Maybe I was too strong by saying all patches should be acked, but >anything more than buffer overflows and off by one errors probably >require a bit more vetting by a human than to just pull in all patches >that a bot flags to be backported. If anyone wants to give me a hand with going through these I'd be more than happy to. I know that Ben Hutchings is looking at the ones that land in 4.4 carefully. It's always good to have more than 1 set of eyes!=