lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <50149E15.9070002@kernel.org>
Date:	Sat, 28 Jul 2012 22:21:09 -0400
From:	Len Brown <lenb@...nel.org>
To:	Alan Cox <alan@...rguk.ukuu.org.uk>
CC:	x86@...nel.org, linux-pm@...ts.linux-foundation.org,
	linux-kernel@...r.kernel.org, Jiri Kosina <jkosina@...e.cz>
Subject: Re: [PATCH 2/4] x86 idle APM: delete apm_cpu_idle()

On 07/28/2012 06:11 AM, Alan Cox wrote:
> On Fri, 27 Jul 2012 18:42:53 -0400
> Len Brown <lenb@...nel.org> wrote:
> 
>> From: Len Brown <len.brown@...el.com>
>>
>> The APM idle feature to call into the BIOS
>> is known to break some machines, and it has dubious benefit
>> on the (decades old) machines it doesn't break.
> 
> You mean "doesn't fit my current plan" I think. I see almost no bugzilla
> APM reports. It's been solid for years.


Hm, I thought it was actually you that mentioned that this particular
feature of APM caused some systems to fail...

Unfortunately quiet bugzilla doesn't tell us the difference between
"solid as a rock and used by millions of users every day"
and "nobody anywhere running new software on this old hardware".

> It makes a big difference on older systems as it drops the clock. If we
> are going to drop this we should probaly also drop APM support entirely
> and 386/486 support.

Do you have an APM system that boots a 2012 kernel?
Are you willing to test new kernels on it?

> If not IMHO it should stay. Various embedded platforms are still using
> ancient hardware setups.
> 
> This is a small stable piece of code that has required no maintainance in
> years
> 
> Furthermore we have a feature removal process. Mark it down to be removed
> in July 2013 if there are no objections, and then wait as per proper
> process.
> 
> NAK

At your request 16 months ago, we did exactly that.
Further, we added build-time and run-time warnings and all they did
was cause distro mis-merges and requests to remove the warnings.

16 months ago we came within inches of dropping APM entirely,
as Stephen said he hadn't maintained it for a long time.
Jiri volunteered to look after it, and Pavel offered
that he had 1 surviving machine someplace that actually
supports APM, though I don't know if boots.

I don't dispute that there may be some APM systems running someplace,
but if nobody is going to test a 2012 kernel on such hardware,
then we are kidding ourselves if we say we "support" today's kernel on it.
Also, the whole idea was even if we do support such HW, this patch
is supposed to make that HW more stable, not less stable.

-Len

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ