Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp1114733pxy; Fri, 23 Apr 2021 00:02:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxscBlqdBDYZIRs5P6TuZpbFW17/BP+1W7ehL4KAfwJ0uWAD5Z+fdGGLf18b+xXLcqlvYgH X-Received: by 2002:a17:902:d913:b029:ec:c4bb:57cf with SMTP id c19-20020a170902d913b02900ecc4bb57cfmr2702017plz.12.1619161342012; Fri, 23 Apr 2021 00:02:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619161342; cv=none; d=google.com; s=arc-20160816; b=Ls0KWRTTigWlIc5aDmt2spsjugAQ2HCqWnwnQj4ZZHEqfoUzVxZcSN9fQFkiOMozf9 M/bTqoxUW94WWi6CQkiyr5GuL/OxKpQ46ZdKzty968vMjWIkh0GFTc6kiWSSz8MWN/HG D/Zvg6DnQZIFEhFCLdYDkfZPy/A20dRWDpw36ouH5Ae4WzHLzr7R+UupZSEbNYqg3jQO zTkJlJvNXngKDEU2aEgtuot//+dqq3MK7s/4+JcfdEKqgXre+nMLpayY825qd43I7ADO YRIJZSM8vo543q36f1UNPBMnDTwrrrCy8d3oqiyoD+e6iD5cnYF3VCJntOC21OoORteb V/0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=5BeObg8uOnhyHRYh5vbTyjx2+E85Q4vpwfukG+nYgP4=; b=dTWrMkESl84EYWJR+l1ulj/kfowkUrcxrnQucS3wfdLKQrvqDtljHwVXbkf/njfpJA +XwZP2ahbkCCFsqr5drvrzbWFAwUXY0+IjlENhad5u3o86sbIjwxyNNQ64uOPhezM5uq tmHuAlwnAq5UzyJJT7Odqpk/5kXoLxEBBZpyl9q2oa4lw57CSdFOBWaMcv6PNG9lHRTU eGFKpRPwTpeCjkI0Xgj5WF6cR9s4jkbslqsrWRQm5s1sF5ciQzENlAqBI0qnuA9F3KWz mFLWycW9+yeHeLemICeZLbBGdCPlI55/z56LHFyiXIajni+5R/qKZ11PZqdiZvhMRwKN wkJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 82si6009100pgf.530.2021.04.23.00.02.09; Fri, 23 Apr 2021 00:02:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230131AbhDWHCH (ORCPT + 99 others); Fri, 23 Apr 2021 03:02:07 -0400 Received: from mail-wm1-f48.google.com ([209.85.128.48]:43584 "EHLO mail-wm1-f48.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229456AbhDWHCG (ORCPT ); Fri, 23 Apr 2021 03:02:06 -0400 Received: by mail-wm1-f48.google.com with SMTP id p10-20020a1c544a0000b02901387e17700fso623567wmi.2 for ; Fri, 23 Apr 2021 00:01:29 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=5BeObg8uOnhyHRYh5vbTyjx2+E85Q4vpwfukG+nYgP4=; b=MqHCUutkkoQpEvspq1120chiSCfluX6k+xtltro4bRCKm+WNivPzdvHxnnpq6goZaq HgZra7cse6bwc+vBRTTrnoXCQcInU31KX/JbNae0Dg7Stkzh5QppVhQd+shs/VI75BUj 32B8DOSYy/E3276bQuDk0wckVAvm985DJDZYhDjwzZ4T2ho2kmCBchrD8BX3CXm60Rrn KXt382Qrx4iDqbDxS3rB0q1w4G7+1ZnsLBJB486/aLGjLKSCA/SNZdUuf3FOdC/J9pQu 4YUkEHkN5GcUnr1AzJqJOP6v6UXovDhOM/MUCvoVetvb8UeGo3hwhhvcbrsURyTmVRME NrwQ== X-Gm-Message-State: AOAM5323vKln5eLjwK1KMyM2/BiBdcsNZ3DyyZEpMc+WWjpv58GjTi6k Xdtssol41CInCyHWIH9zYbU= X-Received: by 2002:a1c:7714:: with SMTP id t20mr4035146wmi.24.1619161288665; Fri, 23 Apr 2021 00:01:28 -0700 (PDT) Received: from [192.168.1.115] (xdsl-188-155-180-75.adslplus.ch. [188.155.180.75]) by smtp.googlemail.com with ESMTPSA id a7sm7702415wrn.50.2021.04.23.00.01.27 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 23 Apr 2021 00:01:27 -0700 (PDT) Subject: Re: [PATCH 000/190] Revertion of all of the umn.edu commits To: Doug Ledford , Jason Gunthorpe , Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, Linus Torvalds , Aditya Pakki , Kangjie Lu , Qiushi Wu , x86@kernel.org, Bjorn Helgaas , "Rafael J. Wysocki" , Arnd Bergmann , David Airlie , Michael Turquette , Bjorn Andersson , Linus Walleij , Bartosz Golaszewski , Daniel Vetter , Jean Delvare , Guenter Roeck , Jiri Kosina , Will Deacon , Laurent Pinchart , Jakub Kicinski , "David S. Miller" , Johan Hovold , Jiri Slaby , Pablo Neira Ayuso , Johannes Berg , Takashi Iwai References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421180155.GA2287172@nvidia.com> <18edc472a95f1d4efe3ef40cc9b8d2611d4ab990.camel@redhat.com> From: Krzysztof Kozlowski Message-ID: <6b19f57c-8d4f-ef3f-9792-f52900137522@kernel.org> Date: Fri, 23 Apr 2021 09:01:26 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.1 MIME-Version: 1.0 In-Reply-To: <18edc472a95f1d4efe3ef40cc9b8d2611d4ab990.camel@redhat.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 22/04/2021 20:53, Doug Ledford wrote: > On Wed, 2021-04-21 at 15:01 -0300, Jason Gunthorpe wrote: >> On Wed, Apr 21, 2021 at 02:57:55PM +0200, Greg Kroah-Hartman wrote: >>> I have been meaning to do this for a while, but recent events have >>> finally forced me to do so. >>> >>> Commits from @umn.edu addresses have been found to be submitted in >>> "bad >>> faith" to try to test the kernel community's ability to review >>> "known >>> malicious" changes.  The result of these submissions can be found in >>> a >>> paper published at the 42nd IEEE Symposium on Security and Privacy >>> entitled, "Open Source Insecurity: Stealthily Introducing >>> Vulnerabilities via Hypocrite Commits" written by Qiushi Wu >>> (University >>> of Minnesota) and Kangjie Lu (University of Minnesota). >> >> I noted in the paper it says: >> >>   A. Ethical Considerations >> >>   Ensuring the safety of the experiment. In the experiment, we aim to >>   demonstrate the practicality of stealthily introducing >> vulnerabilities >>   through hypocrite commits. Our goal is not to introduce >>   vulnerabilities to harm OSS. Therefore, we safely conduct the >>   experiment to make sure that the introduced UAF bugs will not be >>   merged into the actual Linux code >> >> So, this revert is based on not trusting the authors to carry out >> their work in the manner they explained? >> >> From what I've reviewed, and general sentiment of other people's >> reviews I've read, I am concerned this giant revert will degrade >> kernel quality more than the experimenters did - especially if they >> followed their stated methodology. > > I have to agree with Jason. This seems like trying to push a thumbtack > into a bulletin board using a pyle driver. Unless the researchers are > lying (which I've not seen a clear indication of), the 190 patches you > have selected here are nothing more than collateral damage while you are > completely missing the supposed patch submission addresses from which > the malicious patches were sent! > > This all really sounds like a knee-jerk reaction to thier posting. I > have to say, I think it's the wrong reaction to have. Nothing stops you from participating in the review of this revert-series, if you think these are valuable commits. Patches getting the review, won't be reverted (as I understood). Best regards, Krzysztof