The Linux Kernel Mailing List
 help / color / mirror / Atom feed
From: Greg KH <greg@kroah.com>
To: Linus Torvalds <torvalds@linuxfoundation.org>
Cc: Willy Tarreau <w@1wt.eu>,
	leon@kernel.org, security@kernel.org,
	Jonathan Corbet <corbet@lwn.net>,
	skhan@linuxfoundation.org, workflows@vger.kernel.org,
	linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH v2 2/3] Documentation: security-bugs: explain what is and is not a security bug
Date: Fri, 8 May 2026 17:35:39 +0200	[thread overview]
Message-ID: <2026050801-semifinal-expulsion-9af6@gregkh> (raw)
In-Reply-To: <CAHk-=wi6z5BGUUT2p+=qrJg+obom8VnCo3MqB=7xp3Gw+UMMkg@mail.gmail.com>

On Wed, May 06, 2026 at 08:46:07AM -0700, Linus Torvalds wrote:
> [ Coming back to this after a week of trying to clean up the disaster
> that is my inbox after the merge window ]
> 
> On Sun, 3 May 2026 at 04:35, Willy Tarreau <w@1wt.eu> wrote:
> >
> > The use of automated tools to find bugs in random locations of the kernel
> > induces a raise of security reports even if most of them should just be
> > reported as regular bugs. This patch is an attempt at drawing a line
> > between what qualifies as a security bug and what does not, hoping to
> > improve the situation and ease decision on the reporter's side.
> 
> I actually think we may want to go further than this.
> 
> I think we should simply make it a rule that "a 'security' bug that is
> found by AI is public".
> 
> Now, I may be influenced by that "my inbox is a disaster during the
> merge window" thing, but I do think this is pretty fundamental: if
> somebody finds a bug with more or less standard AI tools (ie we're not
> talking magical special hardware and nation-state level efforts), then
> that bug pretty much by definition IS NOT SECRET.

After the past 2 weeks, and the past 2 months, I am going to violently
agree with you here.  We've seen so many "duplicate" bug reports it's
not funny.  All of the modern LLMs are feeding the output back into the
model for future runs, which makes the data totally public.  Even if
not, the output is being monitored by external companies at the very
least.

> So why should be consider it special and have it be on the security list?

I don't think we should anymore.

Yes, having a full reproducer in public is not good, but the general
"this is a bug" comments we should start redirecting to public lists
more.  That's the only way we are going to handle this influx as our
"normal" bug workflow works very well, especially when it comes with a
fix, as these LLM tools can provide very easily.

So if this could be reworded somehow to reflect that, maybe?

But the "what is and is not a security bug" is a good thing overall.  We
need a solid definition of our threat model if for no other reason to
keep me from having to write over and over "Once a driver is bound to
the kernel, we trust the hardware"...

thanks,

greg k-h

  parent reply	other threads:[~2026-05-08 15:35 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <20260503113506.5710-1-w@1wt.eu>
     [not found] ` <20260503113506.5710-4-w@1wt.eu>
2026-05-05 14:09   ` [PATCH v2 3/3] Documentation: security-bugs: clarify requirements for AI-assisted reports Leon Romanovsky
     [not found] ` <20260503113506.5710-3-w@1wt.eu>
2026-05-05 14:10   ` [PATCH v2 2/3] Documentation: security-bugs: explain what is and is not a security bug Leon Romanovsky
2026-05-06 15:46   ` Linus Torvalds
2026-05-06 16:02     ` Willy Tarreau
2026-05-07  4:18       ` Willy Tarreau
2026-05-07  7:14         ` Peter Zijlstra
2026-05-07  7:07       ` Peter Zijlstra
2026-05-07 15:37         ` Linus Torvalds
2026-05-07 15:48           ` Willy Tarreau
2026-05-08 15:35     ` Greg KH [this message]
2026-05-08 15:54       ` Joshua Peisach
2026-05-08 16:07         ` Willy Tarreau
2026-05-08 15:59       ` Willy Tarreau
2026-05-08 16:39         ` Willy Tarreau
2026-05-09  6:39           ` Greg KH
2026-05-09  7:43             ` Willy Tarreau
2026-05-08 20:52   ` Shuah Khan
2026-05-09  4:48     ` Willy Tarreau
2026-05-09 19:50       ` Shuah Khan
     [not found] ` <20260503113506.5710-2-w@1wt.eu>
2026-05-05 14:10   ` [PATCH v2 1/3] Documentation: security-bugs: do not systematically Cc the security team Leon Romanovsky
2026-05-08 15:31   ` Greg KH

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2026050801-semifinal-expulsion-9af6@gregkh \
    --to=greg@kroah.com \
    --cc=corbet@lwn.net \
    --cc=leon@kernel.org \
    --cc=linux-doc@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=security@kernel.org \
    --cc=skhan@linuxfoundation.org \
    --cc=torvalds@linuxfoundation.org \
    --cc=w@1wt.eu \
    --cc=workflows@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox