Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1261879imm; Wed, 10 Oct 2018 11:38:14 -0700 (PDT) X-Google-Smtp-Source: ACcGV62KF9nTaaIKouwD/jyOU5COtE8AOrd+U77GIwW2xnEBkwMbHJIemA0/6P/dJXNNRS33yAkF X-Received: by 2002:a17:902:744c:: with SMTP id e12-v6mr34298180plt.186.1539196694130; Wed, 10 Oct 2018 11:38:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539196694; cv=none; d=google.com; s=arc-20160816; b=nCusUzobhxiTykhGyQxV0FJhAnckXVTl682Uq9cKruFnoZnSbgSGGkh2k8e//g/09H s3ArFlhvllBeaDpDalWlaeKNmWQjck8OW7AEsnlbKcYk1gzDpt7jkIkFxspQB0i92hpQ BBgnuDLvqdFq786mhGtd5JvdW5GUya4SMykt7T8OUjAwguakpPZa13jqEMElAl/kdgyk EhvdFlagLOFoaVfOGhjPAkDrjom4rcIsgwTPPdihEQhNa7oYxa/4rATKkelCr3qOk9XN Df2Z+j+ofOJY3zKSidHc3RVV8tno14WvQSMSs4iYGqmIKGLXMkCqvPVyHRo1Kn2Dmoal ACZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=oiK0EEhORkRTEBxomFkAKkopBwWgvGTz5bp1j/Imd5I=; b=Pg+nM8OMgMN0JpQFFP7o3CHQWhl6Jt8UM7VgdLI6mmBI1+T9CZ3CT1nASm/eb3kKb8 2Xb8ZSlCDgG7Ke79sxBiGZ1aGFT2p57N/W+RkD72Pflyz4ACuRseMUH74DV1MgyWAsvr rKHnHS1GkJGDLKz7mWrXNh2z9FjbmmhnEEm6c9f8ei8z9Nul1W9uv+25OqH9nQ9xJGfM 6X9gROT0ESgml391n9v+Zd+91WEmarhkdzZ/SQLX2ov4Htyp6mQmjNxhjKi6cCQVyOlX RmGFXBNlgk+YKNlMeo/RVIvev0AuNu8IBObk0Q9/APRWZQzD5V4AkOLcnBX5JM4SocBE Q/nw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=PDGegHc5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u2-v6si23855597pgg.355.2018.10.10.11.37.59; Wed, 10 Oct 2018 11:38:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=PDGegHc5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727303AbeJKB7h (ORCPT + 99 others); Wed, 10 Oct 2018 21:59:37 -0400 Received: from mail-pl1-f193.google.com ([209.85.214.193]:44138 "EHLO mail-pl1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726750AbeJKB7h (ORCPT ); Wed, 10 Oct 2018 21:59:37 -0400 Received: by mail-pl1-f193.google.com with SMTP id p25-v6so2926714pli.11; Wed, 10 Oct 2018 11:36:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=oiK0EEhORkRTEBxomFkAKkopBwWgvGTz5bp1j/Imd5I=; b=PDGegHc55idA2/P1XAyJ42qb8/wgkSUaN4wWzTOGB4ul612eE+eaMliC3iEy7Tz8TL cQYRlfyd3zW3HkpFvY4+I0bwXPeqfwFOMBydmVgH7M+O71Je95MCPA1oZNStm/pBu7bM TQsFwKNCwgylLS9Dekhh7UbzAZTxSMUhC4DAbvN76KRoE/w4jrmgNutrPEez3HGB0UVk +S4kVJ6J/XLKrvitRUAHKFMLLN/pswlmiQ8uKN+ebKwZYNTTr+8ydawgSgj4TwuuP7Vg pnkMybuh3P5EIPtU55h9bY6h9VHhh9h0DB1fflUvnZyImrOrqFQn2BQ2ueo6ytDPmYsz Wdrg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=oiK0EEhORkRTEBxomFkAKkopBwWgvGTz5bp1j/Imd5I=; b=hwiOpwABWBHyd4FTU/DJ4v9+6ub+Qpg+4pwl+FHaGmO5FiSp1HQQY4h4ULeW+xsKNz tm+XWJkAlb4zorA+0mXHFpgv8mljPx7xZ+gdJlZmv5F6VYxvZPA+PwdOCSRY/RrmMDF5 Rq6YJtavmu5g76mPF77l7e8mNje6UGRJwtdFkfIdq7ru/SSWN81fLvqNkFV40HPLe/fH IEPXF13OyeQbsKd18hDaHbqtlSW1flsGRU1+DBwOD1+28vNbS86mWDt29wO63ZOI/ChT 44RevXdMGpEhMEDAIF+mfROJRVLatTB8qmUNIB/mMzf1bP5OTL+T3/FLxE8RKHHUhpiV VK7A== X-Gm-Message-State: ABuFfohYGYLwJzu27vkIofxBZ4jtKSBmdPar5GGsCQD8XzxuodMFuBTW NrBqLGj4TqKqNnJQBMTmxLXT79EwCYY= X-Received: by 2002:a17:902:9896:: with SMTP id s22-v6mr618880plp.113.1539196573386; Wed, 10 Oct 2018 11:36:13 -0700 (PDT) Received: from dtor-ws ([2620:15c:202:201:3adc:b08c:7acc:b325]) by smtp.gmail.com with ESMTPSA id n63-v6sm25021906pfn.9.2018.10.10.11.36.11 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 10 Oct 2018 11:36:12 -0700 (PDT) Date: Wed, 10 Oct 2018 11:36:09 -0700 From: Dmitry Torokhov To: Sasha Levin Cc: Michael Schmitz , "3.8+" , lkml , Andreas Schwab , alexander.levin@microsoft.com Subject: Re: [PATCH AUTOSEL 4.18 24/58] Input: atakbd - fix Atari CapsLock behaviour Message-ID: <20181010183609.GG47260@dtor-ws> References: <20181008152523.70705-1-sashal@kernel.org> <20181008152523.70705-24-sashal@kernel.org> <20181010142958.GF32006@sasha-vm> <20181010170219.GA47260@dtor-ws> <20181010181148.GI32006@sasha-vm> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181010181148.GI32006@sasha-vm> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 10, 2018 at 02:11:48PM -0400, Sasha Levin wrote: > On Wed, Oct 10, 2018 at 10:02:19AM -0700, Dmitry Torokhov wrote: > > On Wed, Oct 10, 2018 at 10:29:58AM -0400, Sasha Levin wrote: > > > On Mon, Oct 08, 2018 at 12:20:26PM -0700, Dmitry Torokhov wrote: > > > > Hi Michael, > > > > > > > > On Mon, Oct 8, 2018 at 12:09 PM Michael Schmitz wrote: > > > > > > > > > > Dmitry, > > > > > > > > > > someone on debian-68k reported the bug, which (to me) indicates that the > > > > > code is not just used by me. > > > > > > > > > > Whether or not a functioning Capslock is essential to have? You be the > > > > > judge of that. If you are OK with applying the keymap patch, why not > > > > > this one? > > > > > > > > I have exactly the same concerns about the keymap patch. This all has > > > > not been working correctly for many many years (and it was not broken > > > > in a subtly way as far as I understand, but rather quite obvious). > > > > Thus I do not understand why this belongs to stable release. It is not > > > > a [recent] regression, nor secutiry bug, nor even enabling of new > > > > hardware, that is why I myself did not mark it as stable. > > > > > > > > I still maintain that we pick up for stable too many patches for no > > > > clear benefit. This is similar to the patch for Atmel controllers that > > > > was picked to stable and I asked why, as it is not clear how many > > > > users might be affected (or if the problem the patch was solving was > > > > purely theoretical, or only affecting hardware that is not in > > > > circulation yet). > > > > > > If you belive that a certain piece of code has no actual users, why do > > > you keep it in the upstream kernel to begin with? > > > > Because obviously there are users. Maybe 5 of them, maybe 10. They do > > not follow upstream very closely (otherwise these fixes would have > > appeared in mainline long time ago) but they still exist. And it is not > > hard to keep the driver in if there are not many changes. > > It, similarily, not hard to backport these changes to stable tree > especially if they're in a self-contained driver such as this one. It is easy to backport, but that should not be a criteria. If we backport each end every one patch landing into mainline into stable then "backporting" is trivial. It does mean that it should be done. > > > > > > > I don't think it makes sense to keep something upstream because it might > > > have users, but not backport fixes because there might not have any > > > users. > > > > > > You haven't seen evidence of anyone using/caring about it for a few > > > years? Great! Remove the code and if someone complains we can always > > > revert. This is how all those orphaned archs got removed a few releases > > > back. I'll even submit the patch if you'd like. > > > > > > It doesn't make sense to have "second class citizens" like how you > > > suggested. > > > > Sure does. Look, one of roles of a mantainer is basically a release > > manager. We need to decide what goes into new release, what goes into > > maintenance release, what stays until later milestone. Each release has > > different criteria. With maintenance release you want to minimize the > > disruption while alleviating most recent and critical/high visibility > > issues, IOW you want to get the most bang for your buck. And these > > particular fixes do not give you any bang, none at all. > > > > Same goes for patches that deal with error handling in probe() functions > > that your AUTOSEL scripts like to pick. Yes, they are fixing bugs. But > > show me actually users affected by them? You encounter these issues with > > probe when you do initial device bringup, but once device is stabilized > > probes are expected to succeed. There won't be duplicate sysfs > > attributes, memory will be allocated, and so on. Fixes to remove() might > > be worthwhile if it is a hot-pluggable bus, but otherwise - no. Yes, the > > box may OOPS if someone manually unbind device through sysfs, but the > > solution is no to patch stable kernels, but simply tell user "dont to > > that [yet]". > > > > When selecting a patch for stable ask yourself: "if I do not pick this > > for stable will a distribution be willing to patch this into their > > kernel on their own"? If the answer is "no" it should be pretty strong > > indicator whether a patch belongs to stable or not. > > There is a big difference between distros and the stable trees. Distros > know who their users/customers are, OTOH we have no clue who the users > of stable trees are. > > I think Greg's last estimate was that about 1/3 of the kernels in the > wild are custom based on a kernel.org stable kernel, which means that we > have no visibility as to what they do with the kernel. If you don't know > who your users are, how can you prioritize some subsystems over others? You make a judgement call, based on the data you have. And I think if you want override maintainer decision you need a decent justification, better than "it is easy to backport" or "we do not know if someone might use it". > > I don't think we can do any of that because we don't know who uses the > kernel and what bugs they hit, or don't hit. They should file bugs, report on mailing lists, and so on. If they hit bugs and do not bother to report them anywhere, it is not our problem. They need to be part of community. > This is one of the reasons > we ask everyone to pick everything, if they don't use whatever code we > changed they won't be affected at all. Or there is unexpected behavior change and they are affected. What do you do if users of atakbd adjusted their userspace for the broken kernel map? From my POV it is OK-ish to change in new kernel release, but not in a middle of "stable" series. > > As a trivial example: we run a few kernels with custom configs in > Microsoft. Can you tell which drivers we use and how many machines use > them? Us not showing up in git log doesn't mean we don't use something, > it just means that the stable process works for us. I can tell you that you are not using atakbd ;) Look, if we are talking about Microsoft, what are criteria for changes that are going into "patch tuesday" releases? Is it any random junk that might land on top of the development tree? Or is it just a bit more disciplined? Like Release managers looking at the incoming problem report rates and make a judgement call as to whether pull the fix in or wait for bigger maintenance release? In ChromeOS land it is the latter. Thanks. -- Dmitry