Conversation

Possibly unpopular opinion, but I feel like "only merge things after verifying they are valid" should maybe be the default policy of the most used piece of software in the world.
Image
14
443
Like, the Linux kernel maintainers are saying they can't tell if a patch is malicious so have to rely on the email address domain name. Why are we focusing on the academics, this is a problem!
Quote Tweet
the whole "it's extremely difficult for us to verify that this kernel patch isn't malicious" business is a real indictment of C twitter.com/FiloSottile/st…
14
223
Replying to
Although the Linux maintainers were inexcusably rude, running a study with intentional deception without consent or even coordinating with someone at the project in advance is against every ounce of human subjects training that I've received
5
56
Replying to
I am not defending the academics but I don't rely on them to keep everything around me running and secure. The maintainers' reaction is not rude, is concerning! It sounds like they rely on checking the evil bit to stop malicious patches. What if HackingTeam has Gmail addresses?
5
23
Replying to and
The researchers were submitting correct patches too. They say that in 3 cases, they submitted intentionally incorrect patches and then told the maintainers it was wrong and provided the correct patch instead. They were seemingly doing useful work on the kernel for the most part.
1
2
Lots of these patches appear to be correct fixes for memory corruption, etc. and are going to be reverted due to loss of trust in the authors. In reply to Greg's post on Twitter, a kernel maintainer states a patch to the code they maintain was correct but it's being reverted.
2
My impression is that the kernel maintainers are angry they were embarrassed this way and are reverting all of the useful work that was done out of spite. I don't think this study was fully ethical but I don't think they were being malicious and appeared to be trying to help.
3