lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20081007053808.GB20740@one.firstfloor.org>
Date:	Tue, 7 Oct 2008 07:38:08 +0200
From:	Andi Kleen <andi@...stfloor.org>
To:	"Maciej W. Rozycki" <macro@...ux-mips.org>
Cc:	Andi Kleen <andi@...stfloor.org>, Ingo Molnar <mingo@...e.hu>,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	"Rafael J. Wysocki" <rjw@...k.pl>,
	Dmitry Torokhov <dmitry.torokhov@...il.com>,
	linux-kernel@...r.kernel.org,
	Andrew Morton <akpm@...ux-foundation.org>,
	Len Brown <lenb@...nel.org>,
	Jason Vas Dias <jason.vas.dias@...il.com>
Subject: Re: [PATCH] x86 ACPI: Blacklist two HP machines with buggy BIOSes (Re: 2.6.27-rc8+ - first impressions)

On Tue, Oct 07, 2008 at 02:35:01AM +0100, Maciej W. Rozycki wrote:
> 
> > > It's not that we are unresponsive or do not take 
> > > responsibility for our bugs, is it?
> > 
> > These workarounds are not for mainline kernels but for specific
> > distribution releases (as in "fixes SLES/RHEL x.y" instead of 
> > "fixes 2.6.xy")
> 
>  I am happy to fix any bugs I introduced myself (as much as one can be 
> happy about mistakes once they have discovered they made them that is) and 
> certainly have a look into other Linux bugs by request of any vendor of a 
> Linux distribution made on behalf of a hardware manufacturer.
> 
>  OTOH I do not feel responsible even a little bit for someone else's bugs 
> like those of BIOS developers.  Though I will certainly consider providing 
> them with any assistance needed to get things related to Linux resolved in 
> a best possible way if they ask nicely.

To be honest I think you have a unrealistic approach to this.
That is not how it works.

For the BIOS developers OS are like some piece of random hardware
ot a OS developer. If something doesn't work and if they care
they will add a workaround. Just as the OS developer adds a workaround
for the hardware issue. And yes workarounds are typically not pretty.
And sometimes the workaround come later back to bite someone That is what 
happened here. But they still have to support the old releases if they 
worked before, otherwise they got a regression too.

Using a PCI ID quirk to disable the workaround is a reasonable
approach, although it has its issues too.

Also calling the workaround a BIOS bug is just unfair in this case. It really
isn't. 

> > >  Well, perhaps, but the thermal trip point phenomenon seems unique to this 
> > > family of systems.  The other aspects of the problem do not really matter 
> > > anymore as we seem to have addressed them robustly enough now.
> > 
> > When you need DMI entries you clearly haven't.
> 
>  You can't just break a piece of hardware randomly (setting the thermal 
> trip points based on an interrupt mask of an I/O APIC input is certainly 
> beyond the ACPI spec), hide its documentation and still demand it to be 
> supported correctly, possibly hurting all the other good equipment.  
> Sorry -- you have to draw a line somewhere.  Others seem to agree as 

Well you can blame everyone else, but it doesn't change the fact that
if systems who worked before don't work anymore you've caused regressions.
Which seems to be the case here.

-Andi
-- 
ak@...ux.intel.com
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ