Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp1015371pxy; Wed, 28 Apr 2021 20:23:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxP9wwj6dOll4Q6uIDKnMA9HbHykCY5OSh+BvdR3KWv+rewQgEjIhm21CE/rA4yLRfSOlQO X-Received: by 2002:a17:907:1c01:: with SMTP id nc1mr32296714ejc.283.1619666591388; Wed, 28 Apr 2021 20:23:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619666591; cv=none; d=google.com; s=arc-20160816; b=yqxG1CDBfbqduUCNLdAghnjRjgHYs0WVOT4Zun0Zobyqm5lVIgrYIuwXWkbg1KWlTL ZghY1CFgv8pIhUTvoZcjNz022ENnYE0jh024HmWIvffTVjV9/JSZ3uGR9qsJrL9R11tN 5Brsv0lZf7FhhpQAUlzJIRipJEVJqiyTUCxl11jsNWnuYVcWzxujU92hnWrUR9EzyFMz 6z5c93wKq+i2pipNO0lPZV9YkiW1KPCBj+yFg516mkeH3WL0lBAqPN8L0sPgpztX2KVy hTfrCfA/HPCT1gV72ip8p8xQK51XCeZLuUILhhU3fE1uLB4A+RupNP9Ky5uSQ5L84LeP Gofw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=/FA7+AfCxz1AhPB34L0PEwcUA5otQ/xU9jgnA42tIM0=; b=Ljq08IW+ZwI8EpDUr1FNAc5zCy9FwP9xl/F5CEILCwehLdoK+5/VmiX8a1cClTMM/Q xIaa2vyAunA7qr7GShcxgmnFC8n8ypNm392dumufgeX+D6p158n0XyKi7e6lovFkdeoJ CZMIyxL5Li6jOUgJ88G/T2PW++3I7MOrHP7F//Hqyee90M2YVbZiml8yqXQa16Q6CyV9 VXSek658WVErnLX6XJ7n62RfFsfAxVhtZoXzwJQ02sAXwTEuM/HnyVNTlHVoKSmzscBz f/TxVpY2MyplbQ6ZHkAUjPQOdYAGTRGPkQ7X92HojnEw0qLSbimRvNYp12yj2b28p0Lw Xz2g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d4si1534197edy.533.2021.04.28.20.22.48; Wed, 28 Apr 2021 20:23:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232702AbhD2DWB (ORCPT + 99 others); Wed, 28 Apr 2021 23:22:01 -0400 Received: from outgoing-auth-1.mit.edu ([18.9.28.11]:55396 "EHLO outgoing.mit.edu" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S229805AbhD2DWA (ORCPT ); Wed, 28 Apr 2021 23:22:00 -0400 Received: from cwcc.thunk.org (pool-72-74-133-215.bstnma.fios.verizon.net [72.74.133.215]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 13T3Kvh8028190 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 28 Apr 2021 23:20:59 -0400 Received: by cwcc.thunk.org (Postfix, from userid 15806) id 78C8115C39C4; Wed, 28 Apr 2021 23:20:57 -0400 (EDT) Date: Wed, 28 Apr 2021 23:20:57 -0400 From: "Theodore Ts'o" To: "Darrick J. Wong" Cc: Matthew Wilcox , linux-kernel@vger.kernel.org, linux-fsdevel , pakki001@umn.edu, gregkh@linuxfoundation.org, arnd@arndb.de Subject: Re: [PATCH] ics932s401: fix broken handling of errors when word reading fails Message-ID: References: <20210428222534.GJ3122264@magnolia> <20210428224624.GD1847222@casper.infradead.org> <20210429010351.GI1251862@magnolia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210429010351.GI1251862@magnolia> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 28, 2021 at 06:03:51PM -0700, Darrick J. Wong wrote: > I had half expected them all to get reverted immediately, but since 5.12 > went out with this still included, I thought it worth pointing out that > despite UMN claims that none of their junk patches made it to Linus, > this (mostly benign) one did. Granted, maybe 18 Jan 2019 was earlier > than that, but who knows and who cares? :P The claim was none of their "hypocrite commits" made it to Linus. That said nothing about any of their other patches that had been developed using some of their other research efforts. Greg isn't planning on sending any of the reverts until the 5.13 merge window, after doing a lot of reviews to determine which of the 190 commits were actually incorrect, and of those, how many may have actually introduced security vulnerabilities. "Good faith hypocrite commits", if you will. (Hey, we're all human; I know I've sent my share of buggy commits where I unintentionally introduced a bug. :-) If they can look at the buggy-yet-accepted commits, and map them to the research efforts in their previous papers, and then do feature analysis on the bad commits, maybe it will be possible for them to rework their "hypocrite commit" paper, and perhaps give us some insights about how to better find buggy commits in our code reviews --- that is, besides "try harder" and changing the Code of Conduct to prohibit intentionally introducing bugs (as they had proposed in their now-withdrawn paper). Also of interest is of the 68 UMN commits that did not cleanly revert; it may have been because they were incorrect, but were later fixed and/or reverted. In which case, we can probably learn about how long it takes for problems introduced by "good faith hypocrite commits" to get fixed naturally, without needing to do an emergency code review of all UMN patches sent in the past three years or so. - Ted