nouveau.lists.freedesktop.org archive mirror
 help / color / mirror / Atom feed
From: Greg KH <gregkh@linuxfoundation.org>
To: Kangjie Lu <kjlu@umn.edu>
Cc: David Airlie <airlied@linux.ie>,
	nouveau <nouveau@lists.freedesktop.org>,
	LKML <linux-kernel@vger.kernel.org>,
	Maling list - DRI developers <dri-devel@lists.freedesktop.org>,
	Ben Skeggs <bskeggs@redhat.com>,
	Alex Deucher <alexdeucher@gmail.com>,
	Zhou Qingyang <zhou1615@umn.edu>
Subject: Re: [Nouveau] [PATCH] drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl()
Date: Sat, 29 Jan 2022 15:47:13 +0100	[thread overview]
Message-ID: <YfVTcUA4MKknEawL@kroah.com> (raw)
In-Reply-To: <CAK8Kejr6E76u2kf_OKxC1RT_qsCWXDf7q4WcTC13-OJz5CseWg@mail.gmail.com>

On Sat, Jan 29, 2022 at 08:18:55AM -0600, Kangjie Lu wrote:
> On Fri, Jan 28, 2022 at 1:58 PM Karol Herbst <kherbst@redhat.com> wrote:
> >
> > On Fri, Jan 28, 2022 at 8:54 PM Alex Deucher <alexdeucher@gmail.com> wrote:
> > >
> > > On Fri, Jan 28, 2022 at 2:20 PM Lyude Paul <lyude@redhat.com> wrote:
> > > >
> > > > Sigh-thank you for catching this - I had totally forgot about the umn.edu ban.
> > > > I pushed this already but I will go ahead and send a revert for this patch.
> > > > Will cc you on it as well.
> > >
> > > This seems short-sighted.  If the patch is valid I see no reason to
> > > not accept it.  I'm not trying to downplay the mess umn got into, but
> > > as long as the patch is well scrutinized and fixes a valid issue, it
> > > should be applied rather than leaving potential bugs in place.
> > >
> > > Alex
> > >
> >
> > Even though knowing that malicious code can be introduced via
> > perfectly fine looking patches, and sometimes one will never spot the
> > problem, this patch isn't all that bad tbh.
> >
> > So should we reject patches out of "policies" or should we just be
> > extra careful? But not addressing the concerns as Greg pointed out is
> > also kind of a bad move, but also not knowing what the state of
> > resolving this mess is anyway.
> 
> 
> Seeing some discussion here, I feel I owe you some quick updates on
> the state. We sent three testing patches in August 2020, which is a
> serious mistake. We never did that again and will never do that again.
> All other patches including recent ones were sent to fix real bugs,
> not to introduce problems. Clearly, although most of the patches are
> valid, some patches are still not good enough, but it is not about
> malice. Fixing bugs in Linux isn't an easy task and takes so much
> effort.
> 
> We did not ignore the concerns pointed out by Greg, and have seriously
> taken some actions. For example, we explained how our static-analysis
> tool found the bugs, and members in my research group have internally
> cross-reviewed the found bugs. We sent these patches after contacting
> Greg---I thought Greg allowed us to send patches, but also requested
> us to work on the last process with our administration.

I do not recall saying anything like this at all.

On January 4, I wrote to you and your coworkers on the mailing list
message https://lore.kernel.org/r/YdQfCGf8qr5zZJef@kroah.com by saying:

	Note that your university is still in many kernel maintainer's
	ignore-list (myself included, I dug this up as I saw Fei's response.)
	Please work with your administration and the process that is currently
	happening in order to give you all the needed training so you will not
	keep causing these types of basic errors that keep your patches from
	being accepted.

	*plonk*

And then later in a private email to you on January 5 where you emailed
Kees and me to try to see if you were allowed to start sending patches
again, I said:

	A kernel developer with lots of experience has already offered to work
	with your university.  Hopefully that process has already started, if
	not, I suggest contacting your administration as they should know who
	this is.

and then I closed with:

	Right now you all are still on my "ignore email" lists for patches.

The patches recently submitted have been shown to be incomplete and in
some places, completely wrong.  I have contacted your administration
about this issue because they asked to know if there were any problems
in the future at our last discussion.  In that response today, I wrote:

	I know that incompetence can often times be hard to distinguish from
	malice, but given the track-record here, we are now going to have to
	treat this as malice.  If it is just incompetence, well, that's
	something that your organization needs to overcome.

	Either way, this is not something that the Linux kernel community should
	be forced to endure.

So to be explicit, so you do not misunderstand me somehow:

	No more patches from umn.edu should be accepted into the Linux
	kernel until further public notice.  They should be considered a
	"bad actor" given their prior history of submissions and lack of
	complying with the kernel community's prior requirements to
	them.

Is this understood?

greg k-h

  reply	other threads:[~2022-01-29 14:47 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-01-24 16:58 [Nouveau] [PATCH] drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl() Zhou Qingyang
2022-01-25 19:11 ` Lyude Paul
2022-01-28 10:18 ` Greg KH
2022-01-28 19:20   ` Lyude Paul
2022-01-28 19:53     ` Alex Deucher
2022-01-28 19:57       ` Lyude Paul
2022-01-29  8:32         ` Greg KH
2022-01-28 19:57       ` Karol Herbst
2022-01-28 20:01         ` Alex Deucher
2022-01-29  8:30         ` Greg KH
2022-01-29 14:18         ` Kangjie Lu
2022-01-29 14:47           ` Greg KH [this message]
2022-01-29 15:19             ` Kangjie Lu
2022-01-29 15:54               ` Greg KH
2022-01-29  8:24     ` Greg KH

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=YfVTcUA4MKknEawL@kroah.com \
    --to=gregkh@linuxfoundation.org \
    --cc=airlied@linux.ie \
    --cc=alexdeucher@gmail.com \
    --cc=bskeggs@redhat.com \
    --cc=dri-devel@lists.freedesktop.org \
    --cc=kjlu@umn.edu \
    --cc=linux-kernel@vger.kernel.org \
    --cc=nouveau@lists.freedesktop.org \
    --cc=zhou1615@umn.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).