Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1236439imm; Wed, 10 Oct 2018 11:12:30 -0700 (PDT) X-Google-Smtp-Source: ACcGV61MwwxI2spTu3BUcqqRe0raIH9vGd2H+R2k2fYiRWgv0YJK5QA1MONoIXIBYhxOxRIZ03v5 X-Received: by 2002:a63:8b43:: with SMTP id j64-v6mr30810041pge.149.1539195150864; Wed, 10 Oct 2018 11:12:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539195150; cv=none; d=google.com; s=arc-20160816; b=w3PwU6oA6uZIfhBzjXWUp+k55ch2DYhrQ10ZiiIz7lBVyypkB75TUJtJNm+SwXpFd9 w/DL4eaZrek8f0vuj4EdiRsvoFd2lCnH6B8tslpaAjnlmB380T1UrsiJ68WdYqcTJHdN s88ofJzu0XqzarX3A8M+TvYpva/yIfeRQhGol5+QZG6ZK2RCi/mUORg4zuyNiGqe60b6 FJ641OiqecaqDetuQj0ud39S9yvqfQMb32SfJ+cl+WpN3ZxckNHjXoPNcsixsWNrm3dr cxgqu8oOzM0OsIMuDh1E8fJQmClDO6NswQsi14HP0X4Dzu2o8xc3HdC0Mn/1qMYGxNri SsWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=RvvAjvsL79jNdAlmWbWDQYevrjpLJgpg6XWfhDPUVII=; b=d0VJtWa8SNxsktvOdWnm9y4aouJpl0kjkmxXgD3dPsjcghx74f7JbjPyoOsMkfVdMZ 0IkLuTzIMeID/Gv4Wbx9BEH3t2dSdE48PB+nVaPLM74tDCVF7nUlhrG+X2ptvYwxUrjH 5HASw024mERpoD4Hq9toLcvsupLAQKsm2Js5TPDApLFbiEMC1/ZZdbhU0PfEwe5Fk59/ j2fQBI156lizLRCbAejDzzWn1qp1/uViMoeHtWIe3cxVMg2N1Lx8RlI2OMhLi31GDXmM nwM3oan9XF4JoHJeF4ikjtXg9ojIY8Ae+75PRkeDLIHPy27ZKDHoqGFdr09qZ32BQK/f Aw1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=E7cTuMvy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b127-v6si24634600pga.153.2018.10.10.11.12.13; Wed, 10 Oct 2018 11:12:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=E7cTuMvy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726707AbeJKBfI (ORCPT + 99 others); Wed, 10 Oct 2018 21:35:08 -0400 Received: from mail.kernel.org ([198.145.29.99]:59538 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726525AbeJKBfH (ORCPT ); Wed, 10 Oct 2018 21:35:07 -0400 Received: from localhost (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5E2632087A; Wed, 10 Oct 2018 18:11:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539195109; bh=RvvAjvsL79jNdAlmWbWDQYevrjpLJgpg6XWfhDPUVII=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=E7cTuMvyTrkX38fZ2HR0Z8slqMi1GcU28dOTnRlwNPXgZZpw6qr5J6eQvr6q+Mg72 AB3Pw8MiPVi8y7UDSqosFQ1WqiExXzNjuroC+Q7PChcqBvxllSaARnxbvTs+XMJXB2 /CslJ/l/A8P5gDvfzMXP3h6p4Gxb2+Iby4I8VMDc= Date: Wed, 10 Oct 2018 14:11:48 -0400 From: Sasha Levin To: Dmitry Torokhov Cc: Michael Schmitz , "3.8+" , lkml , Andreas Schwab , alexander.levin@microsoft.com Subject: Re: [PATCH AUTOSEL 4.18 24/58] Input: atakbd - fix Atari CapsLock behaviour Message-ID: <20181010181148.GI32006@sasha-vm> References: <20181008152523.70705-1-sashal@kernel.org> <20181008152523.70705-24-sashal@kernel.org> <20181010142958.GF32006@sasha-vm> <20181010170219.GA47260@dtor-ws> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20181010170219.GA47260@dtor-ws> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 10, 2018 at 10:02:19AM -0700, Dmitry Torokhov wrote: >On Wed, Oct 10, 2018 at 10:29:58AM -0400, Sasha Levin wrote: >> On Mon, Oct 08, 2018 at 12:20:26PM -0700, Dmitry Torokhov wrote: >> > Hi Michael, >> > >> > On Mon, Oct 8, 2018 at 12:09 PM Michael Schmitz wrote: >> > > >> > > Dmitry, >> > > >> > > someone on debian-68k reported the bug, which (to me) indicates that the >> > > code is not just used by me. >> > > >> > > Whether or not a functioning Capslock is essential to have? You be the >> > > judge of that. If you are OK with applying the keymap patch, why not >> > > this one? >> > >> > I have exactly the same concerns about the keymap patch. This all has >> > not been working correctly for many many years (and it was not broken >> > in a subtly way as far as I understand, but rather quite obvious). >> > Thus I do not understand why this belongs to stable release. It is not >> > a [recent] regression, nor secutiry bug, nor even enabling of new >> > hardware, that is why I myself did not mark it as stable. >> > >> > I still maintain that we pick up for stable too many patches for no >> > clear benefit. This is similar to the patch for Atmel controllers that >> > was picked to stable and I asked why, as it is not clear how many >> > users might be affected (or if the problem the patch was solving was >> > purely theoretical, or only affecting hardware that is not in >> > circulation yet). >> >> If you belive that a certain piece of code has no actual users, why do >> you keep it in the upstream kernel to begin with? > >Because obviously there are users. Maybe 5 of them, maybe 10. They do >not follow upstream very closely (otherwise these fixes would have >appeared in mainline long time ago) but they still exist. And it is not >hard to keep the driver in if there are not many changes. It, similarily, not hard to backport these changes to stable tree especially if they're in a self-contained driver such as this one. >> >> I don't think it makes sense to keep something upstream because it might >> have users, but not backport fixes because there might not have any >> users. >> >> You haven't seen evidence of anyone using/caring about it for a few >> years? Great! Remove the code and if someone complains we can always >> revert. This is how all those orphaned archs got removed a few releases >> back. I'll even submit the patch if you'd like. >> >> It doesn't make sense to have "second class citizens" like how you >> suggested. > >Sure does. Look, one of roles of a mantainer is basically a release >manager. We need to decide what goes into new release, what goes into >maintenance release, what stays until later milestone. Each release has >different criteria. With maintenance release you want to minimize the >disruption while alleviating most recent and critical/high visibility >issues, IOW you want to get the most bang for your buck. And these >particular fixes do not give you any bang, none at all. > >Same goes for patches that deal with error handling in probe() functions >that your AUTOSEL scripts like to pick. Yes, they are fixing bugs. But >show me actually users affected by them? You encounter these issues with >probe when you do initial device bringup, but once device is stabilized >probes are expected to succeed. There won't be duplicate sysfs >attributes, memory will be allocated, and so on. Fixes to remove() might >be worthwhile if it is a hot-pluggable bus, but otherwise - no. Yes, the >box may OOPS if someone manually unbind device through sysfs, but the >solution is no to patch stable kernels, but simply tell user "dont to >that [yet]". > >When selecting a patch for stable ask yourself: "if I do not pick this >for stable will a distribution be willing to patch this into their >kernel on their own"? If the answer is "no" it should be pretty strong >indicator whether a patch belongs to stable or not. There is a big difference between distros and the stable trees. Distros know who their users/customers are, OTOH we have no clue who the users of stable trees are. I think Greg's last estimate was that about 1/3 of the kernels in the wild are custom based on a kernel.org stable kernel, which means that we have no visibility as to what they do with the kernel. If you don't know who your users are, how can you prioritize some subsystems over others? I don't think we can do any of that because we don't know who uses the kernel and what bugs they hit, or don't hit. This is one of the reasons we ask everyone to pick everything, if they don't use whatever code we changed they won't be affected at all. As a trivial example: we run a few kernels with custom configs in Microsoft. Can you tell which drivers we use and how many machines use them? Us not showing up in git log doesn't mean we don't use something, it just means that the stable process works for us. -- Thanks, Sasha