Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp5788056rwl; Tue, 11 Apr 2023 09:58:42 -0700 (PDT) X-Google-Smtp-Source: AKy350YyvDQ8LmmhQBrR5kL6+jsVS4A5DrfyTZ9QdrEdl50Fd4Sto6ciGY4db3P81ZbDFtDwUaLk X-Received: by 2002:a17:903:4093:b0:1a2:37fc:b5e2 with SMTP id z19-20020a170903409300b001a237fcb5e2mr15499155plc.7.1681232322639; Tue, 11 Apr 2023 09:58:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681232322; cv=none; d=google.com; s=arc-20160816; b=WAGhkK29aO1awBjuyjgXGrq2KrPMRKCIYwAZhjywDsm7UwzUL0bjKUAAvKkxWgutP6 77i1BxiYdqhIQnNg70b3Mx5agwbCTUE8Cg065aA0+z7f5d1Hpbe0Sam8X345fG6IOKRx k3Vm3DuBRe9oK4U5mNWvaR2WdkzkH8DXtYjpjlWv3vXpOjM1+0ILkuhBg11cMmvoHzbu N/7p2RK15gYn3wwp8nXT1U0Uupp+pjUMmEGAg0MVoAWsa0/8ldpaypDrIyN1vpD/uk6+ rjJIdDMdPs/z83Yq/mZyyj+ggXaV/PhPOx8OuRJvt8TvL/lGiwxKAunX/Z5Ab2vRCENq NVcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=HACmN4rzC5EiJvjH3sKdk4jgN30XM/PH/jS//o3glyE=; b=uN5p+X9ZsjRA4WsVKHI28GbRS8/Qnl8br4XxxYmQeuII7hv5qw0NBnr3lyyPlRT1Cp TH4onYrsqOfCohkrbFcRFla23eDmnLeawx1P/QwYS0FbULUl23WE9B10u/mbi3zQz64x qZOVr7aDNMFiptpHLsD7+AexbgH/L3gWT4TOuChQfWxUtoQyZWFQBWnaaHeGEE+dC/MZ BPWed2zj4vWeAWhOkGcN+4GZbcz4eGx1l3aPzPAMP5ct39iVmDrAueP4GH4xm3wDxC/Y dGkRwkx0geTQonp+N1s0agpmMf4zv9H/tNP7tvZvKKdQRTeR+Zr3NT048tqgEP7Nmbzk zm/w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q13-20020a170902f34d00b001a52707c0adsi8825313ple.1.2023.04.11.09.58.29; Tue, 11 Apr 2023 09:58:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229981AbjDKQw6 (ORCPT + 99 others); Tue, 11 Apr 2023 12:52:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60526 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229932AbjDKQw4 (ORCPT ); Tue, 11 Apr 2023 12:52:56 -0400 Received: from 1wt.eu (wtarreau.pck.nerim.net [62.212.114.60]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 678781991; Tue, 11 Apr 2023 09:52:54 -0700 (PDT) Received: (from willy@localhost) by mail.home.local (8.17.1/8.17.1/Submit) id 33BGqie2009276; Tue, 11 Apr 2023 18:52:44 +0200 Date: Tue, 11 Apr 2023 18:52:44 +0200 From: Willy Tarreau To: Miguel Ojeda Cc: Hans Verkuil , Daniel Almeida , wedsonaf@gmail.com, ojeda@kernel.org, mchehab@kernel.org, rust-for-linux@vger.kernel.org, linux-kernel@vger.kernel.org, linux-media@vger.kernel.org, kernel@collabora.com Subject: Re: [PATCH 0/6] Initial Rust V4L2 support Message-ID: References: <20230406215615.122099-1-daniel.almeida@collabora.com> <136035a4-26df-1c14-e51e-406b4ee5fe33@xs4all.nl> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_HELO_PASS,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 11, 2023 at 04:13:36PM +0200, Miguel Ojeda wrote: > On Tue, Apr 11, 2023 at 2:49?PM Willy Tarreau wrote: > > > > This might sound strange, but I suspect that having a TAINT_RUST flag > > could possibly help maintainers that are already lacking time, because > > it may quickly allow some of them to ask "please try again without the > > Rust code to see if the problem is still there", just like happens with > > out-of-tree code for which the knowledge is limited to null. This could > > allow to route issue reports to one maintainer when an issue is confirmed > > in both cases or to another one when it only happens in a single case. > > > > Of course it will not help with code reviews but we know that a great > > part of maintainers' time it spent trying to analyse problem reports > > that happen under vague conditions. All the time not spent debugging > > something not well understood is more time available for reviews. > > You can already ask to disable `CONFIG_RUST`. > > In fact, we asked that a few times, when people reported a problem > that looked unrelated to Rust, to confirm that was the case and thus > redirect the report. > > So it is definitely a good idea to ask for that when you get a report > with `RUST=y` and you suspect it may be related to that, especially in > the beginning where `RUST=y` should not be common. But if that code is only under a module, there's no need to turn all that code off if it's sufficient to be certain the module was no loaded. Plus it's more friendly to the user who doesn't have to rebuild a kernel, just blacklist a module and check that the kernel doesn't get tainted again. > However, I think Rust in-tree code is different to out-of-tree code, > since you do have the code, and thus (in general) you should be able > to reproduce the build, and you can ask for help to the given > maintainers to understand it. It could depend on the layer where it plugs and the level of intimacy with the core. Sometimes you need a deep understanding of all interactions between elements to imagine possible scenarios. Cheers, Willy