Received: by 2002:a05:6a10:6006:0:0:0:0 with SMTP id w6csp392359pxa; Thu, 27 Aug 2020 05:29:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwNm6JOMgIemM9dxpIBxVsCCqU97i4wW/66bERkY5Lok2QB6fT3ZcKAkOZ0wp7AEwPvSCum X-Received: by 2002:a17:906:19d5:: with SMTP id h21mr20315879ejd.505.1598531343006; Thu, 27 Aug 2020 05:29:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598531343; cv=none; d=google.com; s=arc-20160816; b=p8grdg8b13h3AVeMgweyFKIsuumIDGvmc+NoBs2rBP2YjHqAWw+TY5gdxbqAlueMCn /iUKH2FEyst8ADrtHbGpSgWbcPREHvvkjp8K/CsaHSSH8Bq+pPkIiVeVd+HUjFP2TOAK ZAvj1wK7jVPBHycFlyiMlv2GczlksHQEqOTtNxvi9zM5wI5wZCR4gWoabhWXtHW+EwUI qwJsziGLYMcUwmPTKSMIpskN4pZfFDgnY0EWewP/e59oKumj5hWh+rMrUdieWm3Bs0U9 AcvddmuZbhb0Fzu7YbL2uqChr3HU3lxu8Oe/zvFrM7WzrwVfMmU6QvVZjYep5VLfaPeg QCqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=kwtoVNG5iFW8eENbM4966mc+IQek3nqsMFOokY9ITR8=; b=X9GMpnyfmj2Bxcg4FWEBkkygXO9gfmC42BjpCvcNeBKmPzf/6TKjSs8X3+5o1NkOVR 2AW3DnRWGqDb74F159VaHfWY+hIdG23ID92hhxcdU+H3YyAavsXDiipqkjGpZxwm1WkY ++O+gVW6QroxgtFwpmWfRIjkPgwpOgjLHJQYVBp8uKI1e9A9y5SoinSR+6EpJYXGA9wc JfgzeRRpvXHixw8W/7NYoh7T0botQTJxM5CTmCOPg0YzjW+iPyWf53Jl9Vnd828C6tS5 wp9Lmt5nOcafGYQy9MpU9o+yIZQyYvQ5bBnk6oQ/j64Qp12nrJitruLOUsilTKS9Y/mp kxSg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GF4UTlLO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m23si1245430ejk.621.2020.08.27.05.28.40; Thu, 27 Aug 2020 05:29:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GF4UTlLO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728834AbgH0MYS (ORCPT + 99 others); Thu, 27 Aug 2020 08:24:18 -0400 Received: from mail.kernel.org ([198.145.29.99]:35192 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728847AbgH0MF1 (ORCPT ); Thu, 27 Aug 2020 08:05:27 -0400 Received: from kozik-lap.mshome.net (unknown [194.230.155.216]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AFBFC207F7; Thu, 27 Aug 2020 10:54:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1598525648; bh=kvzTJa+NwN8iQ7TDAjUBOUhTffu2W6eeI3qd7QRV89I=; h=From:To:Cc:Subject:Date:From; b=GF4UTlLOSoie6hxYuCLTVxOzpi2eX6PyIZIoVzbElI+LcEx+UEqs8Vbg/bNvjPfVY 0ovpIAWW9TEGEel9GBBHXCW2C3lwLAt+RsSEa4IK6cu93qX4pQTRvJfmmhCyOP3394 bc9c8Y/qqjXyV9oBrqkohQWA6tMhBiTgBxfrW99U= From: Krzysztof Kozlowski To: Jonathan Corbet , Kees Cook , Greg Kroah-Hartman , Konstantin Ryabitsev , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Marek Szyprowski , Linus Torvalds , Andrew Morton , Brooke Basile , Felipe Balbi , Bartlomiej Zolnierkiewicz , Krzysztof Kozlowski Subject: [PATCH 1/2] docs: process: Add cross-link to security-bugs Date: Thu, 27 Aug 2020 12:53:18 +0200 Message-Id: <20200827105319.9734-1-krzk@kernel.org> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The submitting patches mentions criteria for a fix to be called "security fix". Add a link to document explaining the entire process of handling security bugs. Cc: Greg KH Cc: Marek Szyprowski Cc: Linus Torvalds Cc: Kees Cook Signed-off-by: Krzysztof Kozlowski --- Documentation/process/submitting-patches.rst | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/Documentation/process/submitting-patches.rst b/Documentation/process/submitting-patches.rst index 5219bf3cddfc..d5b3c5a74d5d 100644 --- a/Documentation/process/submitting-patches.rst +++ b/Documentation/process/submitting-patches.rst @@ -299,7 +299,8 @@ sending him e-mail. If you have a patch that fixes an exploitable security bug, send that patch to security@kernel.org. For severe bugs, a short embargo may be considered to allow distributors to get the patch out to users; in such cases, -obviously, the patch should not be sent to any public lists. +obviously, the patch should not be sent to any public lists. See also +:ref:`Documentation/admin-guide/security-bugs.rst `. Patches that fix a severe bug in a released kernel should be directed toward the stable maintainers by putting a line like this:: -- 2.17.1