Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp1705055rwp; Thu, 13 Jul 2023 15:26:22 -0700 (PDT) X-Google-Smtp-Source: APBJJlEgq5uN/B6/tRw/zqSUSWrcSmg6xs13XHjcdFfUNQBckwNonPvBPO+z8iy25IldWbNbxMim X-Received: by 2002:aa7:cb52:0:b0:516:af22:bcc6 with SMTP id w18-20020aa7cb52000000b00516af22bcc6mr2605237edt.21.1689287181871; Thu, 13 Jul 2023 15:26:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689287181; cv=none; d=google.com; s=arc-20160816; b=s1hADQvKQCrPZZFkhxon5wh5COJl7mEGkJRXsiCS5HUF/M8wrn0Fx0yQQAyvoyMJdf LLWq64LRFXPnq4K2GBrrqkl67yFtMO93z+z76EDmpqqDaLnLZLmnMyoauh8v7PGFSFKq IUdlXVPZU19I7caqhmFGhozDF8Kb0E1/k79GnncosTyO8GdK/bay1Kws9zDKOGBGdbJN 3IeK53FPG8s07wch7P9R7Hu3nFG5DkeT5RoemJ2q45z9eU0QlF/bODCX+Z2jH5hRpt3Y QG49Jg+j5lDuFtUrdKhYHPlkKNYILwrl1kR+Ay/b+aqtWQ5+DLUpAjbk0yZ//9908Pf3 aV0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Lbx3ItH5azmABzydAywH50pqbPo81LxOipCuKbUj1VM=; fh=x4aGauYKzK+83GSGb+UYRr6prRlSHxV6yJ1qTo1KnA0=; b=vEdMgPUqDqxoHKaV3Cf8r2IBFNN2+iWtFMPtwd7Lg5Kw00M+qXQIM5fkZd+yJhTiQ9 rFuZe4Qd2CBzHDW+Bdu4ZP+8Rkz1IOKlEIaasEuto+xg2Pm3w8i6TnLbI28g3zwL4O2X i+CXZjcBfFbGTOJ5J6mq4LGVV/YAX8TNWuRspyKunS3WOUqS35EWFK8uIo9UkZdZvWww QY81JRwXp05UbO7mk2jf5V/EgbZ8RPWm/1o0qU7UBQIR3JoeLmvCDDAXpbi6If3MAQPb lux21Vrb9K/AkXqnr1/CdQxeojlA7FNyoy3RqGW8hb1NQN1yCd6xH9mCc6W+UGiu/vnu HjRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=DLTEu1Mw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u18-20020aa7d892000000b0051dd07680f2si7869979edq.370.2023.07.13.15.25.57; Thu, 13 Jul 2023 15:26:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=DLTEu1Mw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232560AbjGMWEw (ORCPT + 99 others); Thu, 13 Jul 2023 18:04:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51718 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231421AbjGMWEu (ORCPT ); Thu, 13 Jul 2023 18:04:50 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F3C6C26B7 for ; Thu, 13 Jul 2023 15:04:49 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 92BA961B7D for ; Thu, 13 Jul 2023 22:04:49 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7D996C433C8; Thu, 13 Jul 2023 22:04:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1689285889; bh=D/qWx366/grQZB6JpvGMiTdaCdiECJ62L0mKndmW+P0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=DLTEu1MwSREm9tHW683jNvnqoVBKnZPNqVIW6KLWIwyFxj7UlQP4pcB0IUtZ4HZY6 1DJHG79RkFnG/BvKN01VaujCCiHM25ueUyJHMaWxsS7qOhx3iCSOEAST1Io+iZvnT2 El7bGziDxVAgxkbVRnsZwLXEilCOIW4rpNU8rqe4= Date: Fri, 14 Jul 2023 00:04:46 +0200 From: Greg KH To: Emanuele Giuseppe Esposito Cc: Vitaly Kuznetsov , x86@kernel.org, Thomas Gleixner , bluca@debian.org, lennart@poettering.net, Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Andrew Morton , Masahiro Yamada , Alexander Potapenko , Nick Desaulniers , Daniel =?iso-8859-1?Q?P=2E_Berrang=E9?= , linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage Message-ID: <2023071429-decibel-amazingly-0185@gregkh> References: <20230711154449.1378385-1-eesposit@redhat.com> <2023071237-private-overhang-7f86@gregkh> <875y6o429i.fsf@redhat.com> <2023071329-persevere-pursuant-e631@gregkh> <87wmz33j36.fsf@redhat.com> <2023071356-royal-charter-a647@gregkh> <5e7716de-ffce-e89d-0aa3-45eed4804652@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5e7716de-ffce-e89d-0aa3-45eed4804652@redhat.com> X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jul 13, 2023 at 10:49:31PM +0200, Emanuele Giuseppe Esposito wrote: > >> I replied to the thread not to defend the idea as after the discussion > >> it is clear there's a lot to take into consideration if anyone decides > >> to pursue the SBAT idea ever again (and the discussion is now well > >> preserved in the archive!). I replied to disagree with "get sign-offs > >> from senior people before sending RFCs" idea, I believe that asking > >> questions by sending a not-fully-ready patch as "RFC" should not be > >> discouraged. > > > > On the contrary, this is EXACTLY what needs to happen here. > > > > This developer (I'm not picking on them at all, it's not their fault), > > should be taking advantage of the resources of their company when > > dealing with core, critical, functionality of the kernel. > > > > To just "throw them at the wolves" like Red Hat did, is a total > > disservice to them, AND it wastes the time and resources of the > > community, as it is not our job to train and teach them, it is the job > > of the senior people at your company to do so. > > > > We have a non-zero number of companies that right now who are in the > > "penalty box" because their developers have had a history of throwing > > crud over the wall, or having inexperienced developers submit changes > > that are obviously wrong, which waste the time and energy of the kernel > > community. For companies that do this, we have instituted the > > requirement that they get review and acceptance of kernel changes from > > the experienced developers within the company BEFORE submitting their > > changes to the community, for the basic fact that this actually saves > > EVERYONE time and energy. > > > > It allows the developer to grow and learn more quickly, it saves the > > energy and time of the reviewers (which is our most valuable resource > > right now) and it provides a solid path forward on the corporate ladder > > of using mentors well, and lifting up your own employees. > > > > I don't think you want us to put Red Hat into this type of policy at > > this point in time, but if you all keep insisting that you can just "let > > loose" inexperienced developers who wish to change the core > > functionality of how we operate, that can easily change. > > Wow, I was not aware of these policies O.O. > What you say makes sense, but what about developers not working in a > company? Then they are completely ignored? Not at all, they are not ignored and are treated as someone who probably needs help. > Otherwise a simple way to trick you is to actually use my gmail address > and you won't ever know that I work for RH. If RH finds out you are misrepresenting yourself like this, I don't think it will go over very well :) Also, we know who almost everyone works for, this isn't a secret. And it would turn out to be worse overall for that developer if they were to attempt that. Remember, kernel development works on trusting other people. If someone looses their trust in you, it's very hard to get it back. thanks, greg k-h