From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 67A75C433DF for ; Thu, 27 Aug 2020 13:33:49 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 3D15D22BF5 for ; Thu, 27 Aug 2020 13:33:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1598535229; bh=R8t0YxpCdH+TjUaLtJfISAakiv108onBurpGzaDuLN4=; h=References:In-Reply-To:From:Date:Subject:To:Cc:List-ID:From; b=JBXVImQCJ3pz6iW7l8YuMV/mjMzKR2OiqWmTAtdsE9AHLZXICK/P4hfcCVKQZg1IV Z+P9PgrisJ9hLn6bHTxCJw4HRt9Eb1SWP52afVfhTR7m1vAyCYyl2gclR9a9kiNI0l AH9SbuFCdApGLCTtsj58TjPe7/3uE3AiE9EenSZs= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727821AbgH0Ndq (ORCPT ); Thu, 27 Aug 2020 09:33:46 -0400 Received: from mail-wm1-f68.google.com ([209.85.128.68]:50990 "EHLO mail-wm1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727056AbgH0N20 (ORCPT ); Thu, 27 Aug 2020 09:28:26 -0400 Received: by mail-wm1-f68.google.com with SMTP id t2so5193122wma.0; Thu, 27 Aug 2020 06:28:25 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=vnE5XnOAU04RtRGwnc1i8f81QJg38PEA9j5A7dNJ4Dc=; b=GkHeP2iRhPxkCVA7Fyc+uq5HUmrhCKI8wAqNcZ2gj0nw6Qw1qL53mbC1N3p8aeJBOz gSBpiXSIAKyODf6QZ4K69Q5Kd37E3ocS2vKyxBJUC0Dt99qSvdUMnwz+/pXGXJYzbokm M61dm6xltNhH0MsphBhqka82k0hxSh6kfcqch/4SXDDov5LY850QtslfnJDB4/SvsBl0 Yd0zO5TJ/8Msh3I25qtg40Pm1/JQKAF5MVBFKg/PxDXTwJ0cIJjeq+mRNYVYRzO/LzIU UO8DaTwZFeLe90G3gfQvFQN8ySX4ft5SVlq2JEB1I1Dcu3zcpJRu4TDYNcgdrEDnkF3w zIEw== X-Gm-Message-State: AOAM531qm/A0xEvBU1N19v+RSJGtt4M7Wrt90UXDmQLS9Z2h2BafycRp L37kmTQMYBk7YMcEH2+AFwWnGW5bZg//cQi2EfQ= X-Google-Smtp-Source: ABdhPJx4dIiFkTVYZkCo8Usm4/wlasCA/mql8y1esdJoewkf9uGAcahvQ3llViFThqjXE8FVFWbuiSYQ9kYrB+/QG5k= X-Received: by 2002:a1c:105:: with SMTP id 5mr11756863wmb.175.1598534904287; Thu, 27 Aug 2020 06:28:24 -0700 (PDT) MIME-Version: 1.0 References: <20200827105319.9734-1-krzk@kernel.org> In-Reply-To: <20200827105319.9734-1-krzk@kernel.org> From: Felipe Balbi Date: Thu, 27 Aug 2020 16:28:13 +0300 Message-ID: Subject: Re: [PATCH 1/2] docs: process: Add cross-link to security-bugs To: Krzysztof Kozlowski Cc: Jonathan Corbet , Kees Cook , Greg Kroah-Hartman , Konstantin Ryabitsev , Linux Doc Mailing List , Kernel development list , Marek Szyprowski , Linus Torvalds , Andrew Morton , Brooke Basile , Bartlomiej Zolnierkiewicz Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On Thu, Aug 27, 2020 at 1:54 PM Krzysztof Kozlowski wrote: > > The submitting patches mentions criteria for a fix to be called > "security fix". Add a link to document explaining the entire process > of handling security bugs. > > Cc: Greg KH > Cc: Marek Szyprowski > Cc: Linus Torvalds > Cc: Kees Cook > Signed-off-by: Krzysztof Kozlowski > --- > Documentation/process/submitting-patches.rst | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/Documentation/process/submitting-patches.rst b/Documentation/process/submitting-patches.rst > index 5219bf3cddfc..d5b3c5a74d5d 100644 > --- a/Documentation/process/submitting-patches.rst > +++ b/Documentation/process/submitting-patches.rst > @@ -299,7 +299,8 @@ sending him e-mail. > If you have a patch that fixes an exploitable security bug, send that patch > to security@kernel.org. For severe bugs, a short embargo may be considered > to allow distributors to get the patch out to users; in such cases, > -obviously, the patch should not be sent to any public lists. > +obviously, the patch should not be sent to any public lists. See also > +:ref:`Documentation/admin-guide/security-bugs.rst `. > > Patches that fix a severe bug in a released kernel should be directed > toward the stable maintainers by putting a line like this:: > -- > 2.17.1 Reviewed-by: Felipe Balbi -- balbi