From: Krzysztof Kozlowski <krzk@kernel.org>
To: Jiaxun Yang <jiaxun.yang@flygoat.com>,
linux-kernel@vger.kernel.org, conduct@kernel.org,
security@kernel.org, cve@kernel.org, linux-doc@vger.kernel.org,
"stable@vger.kernel.org" <stable@vger.kernel.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>,
Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
shuah@kernel.org, lee@kernel.org, sashal@kernel.org,
corbet@lwn.net
Subject: Re: Concerns over transparency of informal kernel groups
Date: Sat, 26 Oct 2024 13:05:56 +0200 [thread overview]
Message-ID: <fae122f1-5a8e-4f92-b468-aba3fcb8ac90@kernel.org> (raw)
In-Reply-To: <73b8017b-fce9-4cb1-be48-fc8085f1c276@app.fastmail.com>
On 25/10/2024 17:15, Jiaxun Yang wrote:
> Dear Linux Community Members,
>
> Over the years, various informal groups have formed within our community,
> serving purposes such as maintaining connections with companies and external
> bodies, handling sensitive information, making challenging decisions, and,
> at times, representing the community as a whole. These groups contribute significantly
> to our community's development and deserve our recognition and appreciation.
>
> I'll name a few below that I identified from `Documentation/`:
> - Code of Conduct Committee <conduct@kernel.org>
> - Linux kernel security team <security@kernel.org>
> - Linux kernel hardware security team <hardware-security@kernel.org>
> - Kernel CVE assignment team <cve@kernel.org>
> - Stable Team for unpublished vulnerabilities <stable@kernel.org>
> (I suspect it's just an alias to regular stable team, but I found no evidence).
>
> Over recent events, I've taken a closer look at how our community's governance
> operates, only to find that there's remarkably little public information available
Oh, spread more FUD under the cloak of helping the community. Reminds me
something, wait, how was it? zx?
> about those informal groups. With the exception of the Linux kernel hardware security
> team, it seems none of these groups maintain a public list of members that I can
> easily find.
>
> Upon digging into the details, I’d like to raise a few concerns and offer some thoughts
> for further discussion:
>
> - Absence of a Membership Register
> Our community is built on mutual trust. Without knowing who comprises these groups,
> it's understandably difficult for people to have full confidence in their work.
No, you might have difficulty, not "all people" which you imply. Please
stop creating sentences like you are speaking for others. You do not
speak for others.
> A publicly available membership list would not only foster trust but also allow us to
> address our recognition and appreciation.
Nope. For some of the groups it is very intentional to hide the
membership. It was explained already why and should be pretty obvious.
>
> - Lack of Guidelines for Actions
> Many of these groups appear to operate without documented guidelines. While I trust each
> respectful individual's integrity, documented guidelines would enable the wider community
> to better understand and appreciate the roles and responsibilities involved.
Guidelines are well documented, although I understand something might be
missing. Feel free to extend the existing documentation, as usual,
patches are welcomed.
>
> - Insufficient Transparency in Decision-Making
> I fully respect the need for confidentiality in handling security matters, yet some
> degree of openness around decision-making processes is essential in my opinion.
> Releasing communications post-embargo, for instance, could promote understanding and
> prevent potential abuse of confidential procedures.
Again, unspecified FUD.
>
> - No Conflict of Interest Policy
> Particularly in the case of the Code of Conduct Committee, there may arise situations
> where individuals face challenging decisions involving personal connections. A conflict
> of interest policy would provide valuable guidance in such circumstances.
Feel free to propose patches instead of claiming there is problem for
others. If you identify issue, propose a patch.
Several other your replies earlier were in similar tone. I am not going
to engage in such discussions and probably neither other people, but
some think that silence is approval or agreement. Thus this reply. for
me this is just FUD.
Best regards,
Krzysztof
next prev parent reply other threads:[~2024-10-26 11:06 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-10-25 15:15 Concerns over transparency of informal kernel groups Jiaxun Yang
2024-10-25 15:36 ` Jiaxun Yang
2024-10-26 11:05 ` Krzysztof Kozlowski [this message]
2024-10-26 13:16 ` Jiaxun Yang
2024-10-26 14:56 ` Theodore Ts'o
2024-10-26 16:33 ` Jiaxun Yang
2024-10-26 17:54 ` Willy Tarreau
2024-10-27 8:40 ` Jiaxun Yang
2024-10-27 1:14 ` Theodore Ts'o
2024-10-26 17:38 ` Yongmin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=fae122f1-5a8e-4f92-b468-aba3fcb8ac90@kernel.org \
--to=krzk@kernel.org \
--cc=conduct@kernel.org \
--cc=corbet@lwn.net \
--cc=cve@kernel.org \
--cc=gregkh@linuxfoundation.org \
--cc=jiaxun.yang@flygoat.com \
--cc=lee@kernel.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=sashal@kernel.org \
--cc=security@kernel.org \
--cc=shuah@kernel.org \
--cc=stable@vger.kernel.org \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox