Received: by 10.192.165.156 with SMTP id m28csp951381imm; Mon, 16 Apr 2018 11:20:27 -0700 (PDT) X-Google-Smtp-Source: AIpwx48ENDoJF2QpuzuBbRxUIJKcMzMvs0OhCh3cN0c6YijttbroEPrIRTxQdWfoDdEG3zK7whjX X-Received: by 2002:a17:902:529:: with SMTP id 38-v6mr16564784plf.64.1523902827523; Mon, 16 Apr 2018 11:20:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523902827; cv=none; d=google.com; s=arc-20160816; b=EXKFAcYbB+pKx0ZIG+sgrTgCKhErlm4qE5PrAvtxlXuy2wzYQ8Y3gjQNeczSkOtnXU bkrYt7+fu7S+QJJLhz7aagK/L9vSqH8FKO6OL4Ut35M+JB0aeh+agoQ4HdqOXszbC8aV QUUJY5WEfNsbxz6CPwI0EjmA40rju9kIP3emmWpYDTa14gfhu1HrrZjLd2Xq2RUIBcoP yNdz7Qc0Uzds3O7716PbNImMVHGhy8yeMrms2MWTy07L2WD2Z3LlAaiw1s1ip8yy9wDz CoDEEo8BoML0//NOZy2vUkiMbpj2j/N0YBzsHevffsimDYeVv1peEHGGM5OGTth66lI0 LKnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-id:spamdiagnosticmetadata:spamdiagnosticoutput :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=4tEB5x66RLzb/VJSNY3Ar7DJe9JDMrxc1ivZWmtyPa8=; b=vmluNwbucJ0YjCceEFnoLjh4uZAVpGSGFN5tXxFq5JueWKTpXOrOZ3LWTwqS1InjYr 3csku/dnRM/rJM21khz5FGOpjmfhr4EzmJzsKApUYneNYaZ1fH7RyrgNd/+wSdEYRA09 KxNu7FtOsRhjBD7Tcr84HlGtNcKi1WM8oOcAQVHKb4spr9pQ+75HpcAfTFtRgUSNlxWQ PKnvo+JdYxGPpgvPrLKAmYDLPYFWM/IklCe8Cqs3U6d0yamgNQ3cH3Snvwvr1wDG6ZoG CqCqcnvnsRSS2233qqPU82yMjQOKMDi2PwXAyk5CUdvQthsbXtPjYy4dYZmKuArNRPpf wDzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@microsoft.com header.s=selector1 header.b=GdDSma/F; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e4-v6si686641pln.331.2018.04.16.11.20.12; Mon, 16 Apr 2018 11:20:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@microsoft.com header.s=selector1 header.b=GdDSma/F; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753190AbeDPSRW (ORCPT + 99 others); Mon, 16 Apr 2018 14:17:22 -0400 Received: from mail-sn1nam01on0117.outbound.protection.outlook.com ([104.47.32.117]:24576 "EHLO NAM01-SN1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752308AbeDPSRT (ORCPT ); Mon, 16 Apr 2018 14:17:19 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=4tEB5x66RLzb/VJSNY3Ar7DJe9JDMrxc1ivZWmtyPa8=; b=GdDSma/FpTH6zVNOYKwZxZuvDdkD2+Hw7RE82gJ1UKmMiCFb6+v+CAwIZxYN9PB/dLtTagCYuHxnf9xEvvck4q600+fH4U/fXwmnr8UIPGp9ts97n01IhvdPu8dvQRdSoISr152unxKRw42D1BBPb8bB1FdXVTW1YMpj2wbVAqU= Received: from DM5PR2101MB1032.namprd21.prod.outlook.com (52.132.128.13) by DM5PR2101MB1127.namprd21.prod.outlook.com (52.132.132.167) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.715.4; Mon, 16 Apr 2018 18:17:18 +0000 Received: from DM5PR2101MB1032.namprd21.prod.outlook.com ([fe80::8109:aef0:a777:7059]) by DM5PR2101MB1032.namprd21.prod.outlook.com ([fe80::8109:aef0:a777:7059%2]) with mapi id 15.20.0715.004; Mon, 16 Apr 2018 18:17:18 +0000 From: Sasha Levin To: Steven Rostedt CC: Pavel Machek , Linus Torvalds , Petr Mladek , "stable@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "akpm@linux-foundation.org" , "linux-mm@kvack.org" , Cong Wang , Dave Hansen , Johannes Weiner , Mel Gorman , Michal Hocko , Vlastimil Babka , Peter Zijlstra , Jan Kara , Mathieu Desnoyers , Tetsuo Handa , Byungchul Park , Tejun Heo Subject: Re: [PATCH AUTOSEL for 4.14 015/161] printk: Add console owner and waiter logic to load balance console writes Thread-Topic: [PATCH AUTOSEL for 4.14 015/161] printk: Add console owner and waiter logic to load balance console writes Thread-Index: AQHTz5h7IvK2v80d0k6VVqDoPwJEM6P4GK8AgAnYKwCAAX5DAIAAHfKAgAADdYCAAAWWgIAABF0AgAACQQCAAA4zgIAAAxqAgAAH5oCAAAkvgA== Date: Mon, 16 Apr 2018 18:17:17 +0000 Message-ID: <20180416181715.GM2341@sasha-vm> References: <20180415144248.GP2341@sasha-vm> <20180416093058.6edca0bb@gandalf.local.home> <20180416153031.GA5039@amd> <20180416155031.GX2341@sasha-vm> <20180416160608.GA7071@amd> <20180416161412.GZ2341@sasha-vm> <20180416170501.GB11034@amd> <20180416171607.GJ2341@sasha-vm> <20180416134423.2b60ff13@gandalf.local.home> In-Reply-To: <20180416134423.2b60ff13@gandalf.local.home> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [52.168.54.252] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;DM5PR2101MB1127;7:JvhAIJkzfj778N+j6hp9KcMno6bwWNp0OqQPLg6/TVIElzjEXN0/zNg3S4WgURM4EXsOMbDS3uutXhoBOwdgBtqTJ0xq/9RZtVx0jRta6TDX1xc2RCcLHAD0rOQdWnnFhkz+XrzOhhlCzLRWp9vMECMg4iK9nfyLMl9DLqSkj6XDYDaw85thUpbtHGDnpPCDStjDQdgHGcZGC/7flVtKByJbPV8zC58pNL70RDf9iRA8pCn6crwNAmSLfctuarQr;20:AI/jgMZwawwUqGGTprab/StKy+ooWk6SCdLmUwSHUOM2abEdXNbOssnTnfv8QCbQvVvS2NHAk8n67SIsRPXj8k1TSPt76BnvagJh1YQzTbDKZkp0IHmGKIomIGm9SkM9tiIrp5y9pJUzwq3aeaXy1GsX00XV3sBF0tLn/3Jiv10= x-ms-exchange-antispam-srfa-diagnostics: SOS; x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(7020095)(4652020)(48565401081)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7193020);SRVR:DM5PR2101MB1127; x-ms-traffictypediagnostic: DM5PR2101MB1127: authentication-results: spf=none (sender IP is ) smtp.mailfrom=Alexander.Levin@microsoft.com; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(28532068793085)(89211679590171)(166708455590820); x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(8211001083)(61425038)(6040522)(2401047)(5005006)(8121501046)(3002001)(10201501046)(3231232)(944501347)(52105095)(93006095)(93001095)(6055026)(61426038)(61427038)(6041310)(20161123562045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123560045)(6072148)(201708071742011);SRVR:DM5PR2101MB1127;BCL:0;PCL:0;RULEID:;SRVR:DM5PR2101MB1127; x-forefront-prvs: 0644578634 x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(7916004)(39860400002)(346002)(366004)(396003)(376002)(39380400002)(199004)(189003)(7736002)(305945005)(3280700002)(10290500003)(33656002)(966005)(99286004)(229853002)(72206003)(6486002)(186003)(478600001)(54906003)(2906002)(316002)(86612001)(105586002)(26005)(93886005)(66066001)(2900100001)(7416002)(81156014)(8676002)(10090500001)(22452003)(68736007)(81166006)(5660300001)(1076002)(33896004)(3660700001)(4326008)(5250100002)(39060400002)(25786009)(14454004)(59450400001)(102836004)(6116002)(6246003)(33716001)(446003)(6306002)(486006)(9686003)(6506007)(6436002)(476003)(53936002)(3846002)(97736004)(8936002)(76176011)(106356001)(6512007)(6916009)(11346002)(86362001)(507254003)(556444002)(217873001);DIR:OUT;SFP:1102;SCL:1;SRVR:DM5PR2101MB1127;H:DM5PR2101MB1032.namprd21.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;A:1;MX:1; received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts) x-microsoft-antispam-message-info: KvYdboh6BUzIY+5BocmsQuhXxxLszL2YYkEvX0/iZz+1PoEESgWd5TNDiZXGirch6kGfodjbuG0QlCRJdS/pq4HSZup4WdupF+Xri1lCOxL+JSD00z5eEgJsoTdi916o1xupIDEOODx6jhINE+tvRMeZaedRV6k7bEOgIrdvMAhKgDz9RhQFl9irW0Esq9NZ spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: 1286281a-6012-434f-b3a7-08d5a3c649dc X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-Network-Message-Id: 1286281a-6012-434f-b3a7-08d5a3c649dc X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Apr 2018 18:17:17.9084 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR2101MB1127 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 16, 2018 at 01:44:23PM -0400, Steven Rostedt wrote: >On Mon, 16 Apr 2018 17:16:10 +0000 >Sasha Levin wrote: > > >> So if a user is operating a nuclear power plant, and has 2 leds: green >> one that says "All OK!" and a red one saying "NUCLEAR MELTDOWN!", and >> once in a blue moon a race condition is causing the red one to go on and >> cause panic in the little province he lives in, we should tell that user >> to fuck off? >> >> LEDs may not be critical for you, but they can be critical for someone >> else. Think of all the different users we have and the wildly different >> ways they use the kernel. > >We can point them to the fix and have them backport it. Or they should >ask their distribution to backport it. It may work in your subsystem, but it really doesn't work this way with the kernel. Let me share a concrete example with you: there's a vfs bug that's a pain to reproduce going around. It was originally reported on CoreOS/AWS: https://github.com/coreos/bugs/issues/2356 But our customers reported to us that they're hitting this issue too. We couldn't reproduce it, and the call trace indicated it may be a memory corrution. We could however confirm with the customers that the latest mainline fixes the issue. Given that we couldn't reproduce it, and neither of us is a fs/ expert, we sent a mail to LKML, just like you suggested doing: https://lkml.org/lkml/2018/3/2/1038 But unlike what you said, no one pointed us to the fix, even though the issue was fixed on mainline. Heck, no one engaged in any meaningful conversation about the bug. I really think that we have a different views as to how well the whole "let me shoot a mail to LKML" process works, which leads to different views on -stable. >Hopefully they tested the kernel they are using for something like >that, and only want critical fixes. What happens if they take the next >stable assuming that it has critical fixes only, and this fix causes a >regression that creates the "ALL OK!" when it wasn't. > >Basically, I rather have stable be more bug compatible with the version >it is based on with only critical fixes (things that will cause an >oops) than to try to be bug compatible with mainline, as then we get >into a state where things are a frankenstein of the stable base version >and mainline. I could say, "Yeah this feature works better on this >4.x version of the kernel" and not worry about "4.x.y" versions having >it better. This is how things used to work, right? Look at redhat kernels for example, they'd stick with a kernel for tens of years, doing the tiniest fixes, only when customers complained, and encouraging users to upgrade only when the kernel would go EoL, and when customers couldn't do that because they were too locked on that kernel version. redhat still supports 2.6.9. I thought we agreed that this is bad? We wanted users to be closer to mainline, and we can't do it without bringing -stable closer to mainline as well.=