From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-ed1-f51.google.com (mail-ed1-f51.google.com [209.85.208.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5741D277017 for ; Tue, 18 Nov 2025 16:01:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.208.51 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763481675; cv=none; b=p2P0ShbSJBtMQU/Qn+zB4CF73zjXh5kG7nOvmgeTBsABx1qhazED5y6DwmCEjZMSVe3LZtpXFTTu5t1iojMefq13tK2tqYvD/ZJ/e3r3YqfXIE025+ZwRfOPrT8OU/9m/O9negTzO9ee0Kg5HswwRIA58A/r4XPBVVexiEHK43s= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763481675; c=relaxed/simple; bh=f+f4NmvH/hRU6pwG216QqgKdKI9se928TAAuNSFnC+c=; h=Date:From:To:Cc:Subject:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=FoMpnMHxeM7NuYtvrfBOYWjvuHL7RVii7oUU/x1C/gPZhwnuAXnwL28YasYTxgsfN4akb4pWXPr8uiKTsdEUMWXEueMQbn6/pvYbukxUaTVKMiEbKMyNx+7jVfCjdeX8Hu5x3xg9c/FnZVB1Y4rgSxtK+rMbAM8wOefYbS1wYLU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=nKCA50iD; arc=none smtp.client-ip=209.85.208.51 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="nKCA50iD" Received: by mail-ed1-f51.google.com with SMTP id 4fb4d7f45d1cf-640a0812658so9086575a12.0 for ; Tue, 18 Nov 2025 08:01:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1763481670; x=1764086470; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:subject:cc:to:from:date:from:to:cc:subject:date :message-id:reply-to; bh=f+f4NmvH/hRU6pwG216QqgKdKI9se928TAAuNSFnC+c=; b=nKCA50iD7wtgBBdu5Y0tWcwu8rhrDvnr8jmB11uIwHOVz2+QkQKiUI9tZWFV/nuNII q/HqEzDqymh4XHKzPZFUTEIRTf5/nr83q2vFsQqFvhEEo6Ph8hnhOdGJeeza3JMRsOQo 0umzYi37yRUIOhxD1CyCMMFnG4Lhk2bCu5Ekt2dIrslyojxKZsYR072NqrzOEPalEMdo YdDIZ00Cn+Zmnb55HU0q0QdqoarsppTh9LFTMmYb1I0pX75qhVptFfYRNAluhi51Wjym N4zFL92/hfQ9eMflxbQc5bNUjSbUgOK/5qpStLpPJHfaTfSUfcldgISQM1H7rgfOKN+2 3rSg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763481670; x=1764086470; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:subject:cc:to:from:date:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=f+f4NmvH/hRU6pwG216QqgKdKI9se928TAAuNSFnC+c=; b=n9YUMs7h9lPI2CTIE2C4UQHTPeXaq1Mytqm4BTfBF6rYH/4SsV+fvVEYUhW0vBrO/D SkQThUNtXd8TQu8PP5A3Oo+b7V6Icw5SJYg9jQjS1+mNEHYh/wCQiQZ2oD37Wnl4Pt46 Zep9MseTI5z4ZZjEXxT0pYyzPAhD7A2t3SGW0H5xAbIE4cemjBFTMtnCXPDcyhLbV99B UA7YpKgVKz2CGrd0j5YGUF+5BrtbhuyN4LvbGUTeYOtKF/UaDiXsN8Z6l4VgOx1wx5pb DjksSgW+K6tHa4QDRotG7UehhT7x2uzi5GyQ7XeqpKix1at5ntk4+SiJnmnbUAKLobAr a98A== X-Forwarded-Encrypted: i=1; AJvYcCVyM53PB+XKxSuzogYRBu+8NFZ/942VmdcLVYmMUVSHzR55QOYChRGSqBDM7h6SRmUN9OAwZbFygWVlJdw=@vger.kernel.org X-Gm-Message-State: AOJu0Yy4JUsaxpKKJ19dA6vp3xloUQyGh1PNhmaALB6e8OHJG/ECsM3P JJm+uSiEbkhQdeWQmkN94wFxjnYfQ/qr/n868Yk+POdTyyqyVAlpLymt X-Gm-Gg: ASbGnctatD7sH8ciRbCWeN+2u/6mzHjZyBOEn2uylQt33Kcuo9Nol9rQvQfhw/5r9D+ GZEnDAhGucUoxthUsYW2jE36TgrPXi/LdjchxO51/O4m0o5jgzeG1AbFf09iSpbYvbd6NeH2vnT HbnpkupA4inl5X+F38gWOynZ5DjOBUSsWeQiMlMazApT0T2OI4Rhoz7sguj7XdidpqojbNDtiAv yTj5Ixo+j2LV192sZk5CPZtjzQrUFfn9yHfFpoxEcd6tNitgC1r2g4UzSP0q+6ZhWPrYZTTxu6F mEp81L9kWxiwo4LyzJDK9QPB5TUU5oC3mG+Uh1uRT4wLgMuNzU+zeAA+KS2Az/PdJF8eNqL2QY2 wzYIWcLoijH0vRvvPcCuNdLjPQ4W1E239E876tF//ReBvKH8dJ1AHp7t5+IMCy0Pei9GJyJ//JZ 8I0cbJJ20yQkJrBhtEihmCvgs= X-Google-Smtp-Source: AGHT+IEI9gRZBd5rw55mfRNgp0K59II8BMuYUwmil2KCu3C+5VPmVjBNjw5eAJ15yG/f8AfTotGMPw== X-Received: by 2002:a17:907:94d5:b0:b3f:f207:b748 with SMTP id a640c23a62f3a-b7367828a3amr1839833266b.10.1763481670026; Tue, 18 Nov 2025 08:01:10 -0800 (PST) Received: from foxbook (bhd138.neoplus.adsl.tpnet.pl. [83.28.93.138]) by smtp.gmail.com with ESMTPSA id a640c23a62f3a-b734fedb2eesm1375643166b.68.2025.11.18.08.01.07 (version=TLS1_2 cipher=AES128-SHA bits=128/128); Tue, 18 Nov 2025 08:01:09 -0800 (PST) Date: Tue, 18 Nov 2025 17:01:04 +0100 From: Michal Pecio To: Mauro Carvalho Chehab Cc: Ricardo Ribalda , Laurent Pinchart , Hans de Goede , Mauro Carvalho Chehab , linux-media@vger.kernel.org, linux-kernel@vger.kernel.org, linux-usb@vger.kernel.org, Greg Kroah-Hartman Subject: Re: [PATCH 4/4] media: uvcvideo: Introduce allow_privacy_override Message-ID: <20251118170104.01dba6bf.michal.pecio@gmail.com> In-Reply-To: References: <20251117-uvcdynctrl-v1-0-aed70eadf3d8@chromium.org> <20251117-uvcdynctrl-v1-4-aed70eadf3d8@chromium.org> <2025111817-wages-anyone-e39a@gregkh> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Tue, 18 Nov 2025 15:09:16 +0100, Mauro Carvalho Chehab wrote: > On other words, if someone has secure boot enabled, he can be more > confident that a distro-vendor signed Kernel will honour the privacy > LED, and not even the root can tamper with - as BIOS access to > disable secure boot would be needed to change it - plus, booting a > non-signed kernel. IMHO users are better off trusting duct tape than any chain of trust, and those with tinfoil hats already do. Rational people with any clue will simply assume their computer broke and put duct tape over the LED, carefully not to cover the lens ;) Regards, Michal