Received: by 10.192.165.156 with SMTP id m28csp901587imm; Thu, 19 Apr 2018 09:21:46 -0700 (PDT) X-Google-Smtp-Source: AIpwx48XgvVkrB36fQSPC+/6lKUQWlXFnF3eB/y4NlWcVZvGUnn+tNmULsvrdaayweWhTCfbpa/c X-Received: by 2002:a17:902:43:: with SMTP id 61-v6mr6862538pla.112.1524154906585; Thu, 19 Apr 2018 09:21:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524154906; cv=none; d=google.com; s=arc-20160816; b=uBmXZrJ1MJNiHfv/fisTAKzlf0uNsw+Z8Qxy9YQCViCK0qY82w3VNU0S3UD0r7SVmZ x0bfYoNrV2lzQ4itrqrVStAhnjpk2ebNJXcR7UwXHuo0kOcFBxAIJF6T+LkArnhjvG2G ONn+oDYYdnftF0kRL88QlWvZApe18D80Nz03XHesP7f9G5OE7Y2DpTr87t4xMR/HGLTd VYOWnuiPYjUiBhDC8OdVMq3ayWmeiDPKiSdCWDkPJ9vhC0+Rt6qZCxt8VNrMSwwW15qe rNV7K7HyxMHS1wpio6ou0k/0B/wWLoCSoN3jgwd80L64+6tyM0LHFw1XC25FwxJQ5sdt 5IMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:date:message-id:from :references:cc:to:subject:arc-authentication-results; bh=G7OjkxLkXMEbUyHfEqsCIWdM+6K95PRwnphR+ed7C0E=; b=vq4w/YbleoVG11yehZjpg+TRB5+Pk5zA9UGmmamX+mDewPFplexUFR66/ULy1MAs8s 7+GFkTB09Pgk4aIXu64QvLD7S18hTaCU4Zf/V4NgOHHJ2x2ofsKcgnfRDFJLVt4B6/6D fQv1FB05mHkN7r6Ii1HBq0/j221j2RtWzqdjn7eXykmoH52XWAFzdHCu6Siw++Fb11g3 zFaaJwegsXYo1ak4E5Fj2iExsUHk2/xJHB6ayyysTybRI0OZJrq2svCxYb5BVvC8SEwG ZV/gPZxSry6ovBDHfn803AaNq9OLUhjYIcqgFpMn+KY0nAVV5474Xuk83uMzAEfg7k7i 1KiA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q24si3396927pff.13.2018.04.19.09.21.30; Thu, 19 Apr 2018 09:21:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753879AbeDSQUI (ORCPT + 99 others); Thu, 19 Apr 2018 12:20:08 -0400 Received: from mx2.yrkesakademin.fi ([85.134.45.195]:52623 "EHLO mx2.yrkesakademin.fi" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753511AbeDSQUG (ORCPT ); Thu, 19 Apr 2018 12:20:06 -0400 Subject: Re: [PATCH AUTOSEL for 4.14 015/161] printk: Add console owner and waiter logic to load balance console writes To: Sasha Levin , Thomas Backlund CC: Greg KH , Steven Rostedt , Linus Torvalds , Petr Mladek , "stable@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "akpm@linux-foundation.org" , "linux-mm@kvack.org" , Cong Wang , Dave Hansen , Johannes Weiner , Mel Gorman , Michal Hocko , Vlastimil Babka , Peter Zijlstra , Jan Kara , Mathieu Desnoyers , Tetsuo Handa , Byungchul Park , Tejun Heo , Pavel Machek References: <20180415144248.GP2341@sasha-vm> <20180416093058.6edca0bb@gandalf.local.home> <20180416113629.2474ae74@gandalf.local.home> <20180416160200.GY2341@sasha-vm> <20180416121224.2138b806@gandalf.local.home> <20180416161911.GA2341@sasha-vm> <7d5de770-aee7-ef71-3582-5354c38fc176@mageia.org> <20180419135943.GC16862@kroah.com> <6425991f-7d7f-b1f9-ba37-3212a01ad6cf@mageia.org> <20180419150954.GC2341@sasha-vm> From: Thomas Backlund Message-ID: <0714b77f-d659-3c8b-8225-f435d7c08ae7@mageia.org> Date: Thu, 19 Apr 2018 19:20:03 +0300 MIME-Version: 1.0 In-Reply-To: <20180419150954.GC2341@sasha-vm> Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-WatchGuard-Spam-ID: str=0001.0A0C0206.5AD8C1B6.01C5,ss=2,re=0.000,recu=0.000,reip=0.000,cl=2,cld=1,fgs=0 X-WatchGuard-Spam-Score: 2, suspect; 0, virus threat unknown X-WatchGuard-Mail-Client-IP: 85.134.45.195 X-WatchGuard-Mail-From: tmb@mageia.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Den 19.04.2018 kl. 18:09, skrev Sasha Levin: > On Thu, Apr 19, 2018 at 06:04:26PM +0300, Thomas Backlund wrote: >> Den 19.04.2018 kl. 16:59, skrev Greg KH: >>> Anyway, we are trying not to do this, but it does, and will, >>> occasionally happen. Look, we just did that for one platform for >>> 4.9.94! And the key to all of this is good testing, which we are now >>> doing, and hopefully you are also doing as well. >> >> Yeah, but having to test stuff with known breakages is no fun, so we >> try to avoid that > > Known breakages are easier to deal with than unknown ones :) well, if a system worked before the update, but not after... Guess wich one we want... > > I think that that "bug compatability" is basically a policy on *which* > regressions you'll see vs *if* you'll see a regression. > No. Intentionally breaking known working code in a stable branch is never ok. As I said before... something that never worked is not a regression, but breaking a previously working setup is... That goes for security fixes too... there is not much point in a security fix, if it basically turns into a local DOS when the system stops working... People will just boot older code and there you have it... > We'll never pull in a commit that introduces a bug but doesn't fix > another one, right? So if you have to deal with a regression anyway, > might as well deal with a regression that is also seen on mainline, so > that when you upgrade your stable kernel you'll keep the same set of > regressions to deal with. > Here I actually like the comment Linus posted about API breakage earlier in this thread... If you break user workflows, NOTHING ELSE MATTERS. Even security is secondary to "people don't use the end result, because it doesn't work for them any more". _This_ same statement should be aknowledged / enforced in stable trees too IMHO... Because this is what will happend... simple logic... if it does not work, the enduser will boot an earlier kernel... missing "all the good fixes" (including security ones) just because one fix is bad. For example in this AUTOSEL round there is 161 fixes of wich the enduser never gets the 160 "supposedly good ones" when one is "bad"... How is that a "good thing" ? And trying to tell those that get hit "this will force upstream to fix it faster, so you get a working setup in some days/weeks/months..." is not going to work... Heh, This even reminds me that this is just as annoying as when MS started to "bundle monthly security updates" and you get 95% installed just to realize that the last 5% does not work (or install at all) and you have to rollback to something working thus missing the needed security fixes... Same flawed logic... Thnakfully we as distro maintainers can avoid some of the breakage for our enduses... -- Thomas