Much ado about SBAT
Much ado about SBAT
Posted Jul 20, 2023 18:59 UTC (Thu) by willy (subscriber, #9762)In reply to: Much ado about SBAT by bluca
Parent article: Much ado about SBAT
eg https://lwn.net/ml/linux-kernel/87wmz33j36.fsf@redhat.com/
Annoying the people who have to apply your patch is not a good start.
Posted Jul 20, 2023 19:16 UTC (Thu)
by bluca (subscriber, #118303)
[Link] (2 responses)
Posted Jul 20, 2023 19:33 UTC (Thu)
by willy (subscriber, #9762)
[Link]
Posted Jul 28, 2023 15:22 UTC (Fri)
by jschrod (subscriber, #1646)
[Link]
It doesn't help soliciting favorable sympathies either.
Posted Jul 20, 2023 19:39 UTC (Thu)
by Lionel_Debroux (subscriber, #30014)
[Link]
Yes, I'm aware that memtest86+ isn't a general-purpose OS, and that as such, SB bypasses should be very few and very far between, and therefore, SBAT update handling - if ever needed - shall be a non-issue. The Linux kernel is in a different situation, I fully understand it.
Much ado about SBAT
Much ado about SBAT
Much ado about SBAT
Much ado about SBAT
However... there is significant contrast between the way this memtest86+ PR went, and the way this LKML thread (which I did not read entirely) went. Enough that one could argue that there may have been a nicer way to handle the situation on LKML, perhaps ?