Received: by 2002:a05:6a10:6006:0:0:0:0 with SMTP id w6csp438039pxa; Thu, 27 Aug 2020 06:35:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxbcnPlPg33pNbXxB3t3rUyN5MFadFoZDu8o9HxqzjKIipybIGa5WXKBlttrMS331G8F1RZ X-Received: by 2002:a05:6402:b9c:: with SMTP id cf28mr9837700edb.274.1598535308484; Thu, 27 Aug 2020 06:35:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598535308; cv=none; d=google.com; s=arc-20160816; b=xf4bsXtH8MuXZyqoqftQmlH2hJJ82wgSMu9Zy1SnT1ejHHBzc8oxMJO2j+9Od/siPI T/pOrYKO7GyPUEkF8h46L0MKgJzgRYeLT8g4ao9+aXnjKDyVbue3k5PThy3BK1ZX6RXP 8zJGJcMqs54J4hcp175s/nx6JAEkpfb0Wp7Zid1tEztB+qzcJU3N/byjJgBbMWv9ESzh b39xBIeNNBMLBQoe6H7lVS2hq2SkYhP46ZYooJMRvvf5Q0+C2jp0/H9er3oxSWgOzQ1U Ko9+qgn6wFfQc6pvCkWP7oZoGJkQLaxmmjkoIp9dY0n9gOOQhkxtlCUiqCYHAEpzwQjX SiLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version; bh=vnE5XnOAU04RtRGwnc1i8f81QJg38PEA9j5A7dNJ4Dc=; b=dmJHwzfVBkF1wOnrkxnTNWfxSurJb6w6gVesz7HA/K+0h2SY3kDESkaQJW74mNt08p /RwD3cus3ETDGp8cY8xYCRPFmqW6djgs7dgk2Xx3jOY2sA5EdNVTyMOe5hxXBvIkuvrS afZoToaDKy8ucURwqTNHnO0efvjIoerKaCr1dQBJN8uxf9ses3O62qpU3xWF006EgFcw FA23HimqkIw1un/07SSBxN7nKwAO+cP4jjyFm8rp0vYKppb5R0C6pwyD1IF70Fl0wCQT cc71wTmtdHB7FyI0gLxGEYn90eEfeLR3V5ORagrDscdGxKpm9VZDWeeBP/gglKGeKKoe wvgw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w26si1577340edu.383.2020.08.27.06.34.44; Thu, 27 Aug 2020 06:35:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728215AbgH0Ndj (ORCPT + 99 others); Thu, 27 Aug 2020 09:33:39 -0400 Received: from mail-wm1-f68.google.com ([209.85.128.68]:50990 "EHLO mail-wm1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727056AbgH0N20 (ORCPT ); Thu, 27 Aug 2020 09:28:26 -0400 Received: by mail-wm1-f68.google.com with SMTP id t2so5193122wma.0; Thu, 27 Aug 2020 06:28:25 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=vnE5XnOAU04RtRGwnc1i8f81QJg38PEA9j5A7dNJ4Dc=; b=GkHeP2iRhPxkCVA7Fyc+uq5HUmrhCKI8wAqNcZ2gj0nw6Qw1qL53mbC1N3p8aeJBOz gSBpiXSIAKyODf6QZ4K69Q5Kd37E3ocS2vKyxBJUC0Dt99qSvdUMnwz+/pXGXJYzbokm M61dm6xltNhH0MsphBhqka82k0hxSh6kfcqch/4SXDDov5LY850QtslfnJDB4/SvsBl0 Yd0zO5TJ/8Msh3I25qtg40Pm1/JQKAF5MVBFKg/PxDXTwJ0cIJjeq+mRNYVYRzO/LzIU UO8DaTwZFeLe90G3gfQvFQN8ySX4ft5SVlq2JEB1I1Dcu3zcpJRu4TDYNcgdrEDnkF3w zIEw== X-Gm-Message-State: AOAM531qm/A0xEvBU1N19v+RSJGtt4M7Wrt90UXDmQLS9Z2h2BafycRp L37kmTQMYBk7YMcEH2+AFwWnGW5bZg//cQi2EfQ= X-Received: by 2002:a1c:105:: with SMTP id 5mr11756863wmb.175.1598534904287; Thu, 27 Aug 2020 06:28:24 -0700 (PDT) MIME-Version: 1.0 References: <20200827105319.9734-1-krzk@kernel.org> In-Reply-To: <20200827105319.9734-1-krzk@kernel.org> From: Felipe Balbi Date: Thu, 27 Aug 2020 16:28:13 +0300 Message-ID: Subject: Re: [PATCH 1/2] docs: process: Add cross-link to security-bugs To: Krzysztof Kozlowski Cc: Jonathan Corbet , Kees Cook , Greg Kroah-Hartman , Konstantin Ryabitsev , Linux Doc Mailing List , Kernel development list , Marek Szyprowski , Linus Torvalds , Andrew Morton , Brooke Basile , Bartlomiej Zolnierkiewicz Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On Thu, Aug 27, 2020 at 1:54 PM Krzysztof Kozlowski wrote: > > The submitting patches mentions criteria for a fix to be called > "security fix". Add a link to document explaining the entire process > of handling security bugs. > > Cc: Greg KH > Cc: Marek Szyprowski > Cc: Linus Torvalds > Cc: Kees Cook > Signed-off-by: Krzysztof Kozlowski > --- > Documentation/process/submitting-patches.rst | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/Documentation/process/submitting-patches.rst b/Documentation/process/submitting-patches.rst > index 5219bf3cddfc..d5b3c5a74d5d 100644 > --- a/Documentation/process/submitting-patches.rst > +++ b/Documentation/process/submitting-patches.rst > @@ -299,7 +299,8 @@ sending him e-mail. > If you have a patch that fixes an exploitable security bug, send that patch > to security@kernel.org. For severe bugs, a short embargo may be considered > to allow distributors to get the patch out to users; in such cases, > -obviously, the patch should not be sent to any public lists. > +obviously, the patch should not be sent to any public lists. See also > +:ref:`Documentation/admin-guide/security-bugs.rst `. > > Patches that fix a severe bug in a released kernel should be directed > toward the stable maintainers by putting a line like this:: > -- > 2.17.1 Reviewed-by: Felipe Balbi -- balbi