LWN: Comments on "Maintainers Summit topics: pull depth, hardware vulnerabilities, etc." https://lwn.net/Articles/799262/ This is a special feed containing comments posted to the individual LWN article titled "Maintainers Summit topics: pull depth, hardware vulnerabilities, etc.". en-us Wed, 29 Oct 2025 14:48:41 +0000 Wed, 29 Oct 2025 14:48:41 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Maintainers Summit topics: pull depth, hardware vulnerabilities, etc. https://lwn.net/Articles/800376/ https://lwn.net/Articles/800376/ ajdlinux <div class="FormattedComment"> Stephen is paid to do the linux-next work.<br> </div> Mon, 23 Sep 2019 14:46:57 +0000 Maintainers Summit topics: pull depth, hardware vulnerabilities, etc. https://lwn.net/Articles/800067/ https://lwn.net/Articles/800067/ nevets <div class="FormattedComment"> <font class="QuotedText">&gt; As the discussion is set up, however, it looks like the only thing that's going to cause a change of MO here is reality catching up with the presently broken MO.</font><br> <br> Exactly. As the topic is now blacklisted from further Maintainer Summits, the only way it will come back is when a real problem happens. Linus's entire point is "We haven't had an issue yet, so stop worrying about it". We need an issue to happen so that we can then rightfully complain to Linus.<br> </div> Fri, 20 Sep 2019 03:19:35 +0000 Maintainers Summit topics: pull depth, hardware vulnerabilities, etc. https://lwn.net/Articles/800064/ https://lwn.net/Articles/800064/ karim <div class="FormattedComment"> Yes, I gathered that part as well regarding the kprobes part of the discussion. And that's not just "inconvenient", as is the case for in-kernel tracepoints, but rather downright scary. In fact I'm willing to bet good money this approach is going to come to bite at some point in the future TBD. What happens when such internal code that needed changing contained a bug and there's no way to revert without reintroducing the bug? What if the code had to be obsoleted? etc.<br> <p> As the discussion is set up, however, it looks like the only thing that's going to cause a change of MO here is reality catching up with the presently broken MO.<br> </div> Fri, 20 Sep 2019 03:13:13 +0000 Maintainers Summit topics: pull depth, hardware vulnerabilities, etc. https://lwn.net/Articles/800063/ https://lwn.net/Articles/800063/ nevets <div class="FormattedComment"> I guess the best way to describe what Linus said is that they are not an ABI, until they are.<br> <p> It's even worse now that if a tool can be built on a kprobe (dynamic tracepoint defined by a user, not a kernel developer), and the internal code changes, that, according to Linus, is now an ABI breakage, and the code that changed will be reverted!<br> </div> Fri, 20 Sep 2019 03:04:24 +0000 Maintainers Summit topics: pull depth, hardware vulnerabilities, etc. https://lwn.net/Articles/799895/ https://lwn.net/Articles/799895/ olof <div class="FormattedComment"> Hm, maybe I said that Linus needs to roar at other subsystems, but it's not what I intended to say and I'd definitely like to take any such request back.<br> <p> What I was trying to express was that the ARM cleanups wouldn't have happened unless things ended up reaching a breaking point with dire consequences on the horizon, and that some of the changes that might be beneficial w.r.t. people working closer together across company/subsystem boundaries in other areas might need some external motivation.<br> <p> I certainly didn't mean to encourage any kind of angry outbursts or yelling at people.<br> </div> Thu, 19 Sep 2019 03:28:19 +0000 Maintainers Summit topics: pull depth, hardware vulnerabilities, etc. https://lwn.net/Articles/799885/ https://lwn.net/Articles/799885/ karim <div class="FormattedComment"> Tracepoints should not be ABI. Advertising them as such ensures they aren't added to the kernel and gives a false sense of security to user space. Unless, or course, the goal is to minimize in-kernel tracepoints to begin with.<br> </div> Thu, 19 Sep 2019 01:19:01 +0000 Maintainers Summit topics: pull depth, hardware vulnerabilities, etc. https://lwn.net/Articles/799629/ https://lwn.net/Articles/799629/ ndesaulniers <div class="FormattedComment"> Brounie is helping out this cycle.<br> </div> Wed, 18 Sep 2019 03:04:10 +0000 Maintainers Summit topics: pull depth, hardware vulnerabilities, etc. https://lwn.net/Articles/799587/ https://lwn.net/Articles/799587/ geofft <div class="FormattedComment"> Is he working these 16-hour days as a volunteer? Why is nobody else doing it / could other people help out? (I looked for the automation recently but didn't see anything obvious, is it done by hand?)<br> <p> Should LF be paying him (and others) to do it?<br> </div> Tue, 17 Sep 2019 20:51:21 +0000 Maintainers Summit topics: pull depth, hardware vulnerabilities, etc. https://lwn.net/Articles/799536/ https://lwn.net/Articles/799536/ jgg <div class="FormattedComment"> It is very worrying that Stephen Rothwell is overloaded, linux-next is incredibly valuable.<br> </div> Tue, 17 Sep 2019 16:20:19 +0000