From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from ms.lwn.net (ms.lwn.net [45.79.88.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 947D025B090; Wed, 13 May 2026 21:02:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=45.79.88.28 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778706132; cv=none; b=cfbrm9sAaaz3NY7SZxsAnIhsKqwvmaQSGXYgXW7lF+D3/1Lz7H0jXMV4k+wQMJnc70VKuMTDN/Io5p0WIaU+mtXqgSw/m+ZZAlP/7UtsQhs18COB7kHvxYOlTF5hUkG5KLvDUt/TZK+tnOfMBz88I9GNdWQ+SF5ryzLLR80sYCo= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778706132; c=relaxed/simple; bh=TbkfPc8h9Yg2Y+A1hZpT5WLyg3Z/a6kJE+PemykFAuQ=; h=From:To:Cc:Subject:In-Reply-To:References:Date:Message-ID: MIME-Version:Content-Type; b=eTjUt5+lV59nYG7pX6KiCH2izwDyXEZkc6zoMuEyVwYh3hzOn7pieTWY0mR2d3d5UBS0+1jT3RVwNhcapUMlpUlrVaYnh1HuE/kxB/uMYL7TGOgYkL7gnXT2pmIUWh0cKBa2LL9d1QpxHKx5jgHkBk4gk5EmL7DHLySfo0cLeLU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=lwn.net; spf=pass smtp.mailfrom=lwn.net; dkim=pass (2048-bit key) header.d=lwn.net header.i=@lwn.net header.b=pSV2QSNG; arc=none smtp.client-ip=45.79.88.28 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=lwn.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=lwn.net Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=lwn.net header.i=@lwn.net header.b="pSV2QSNG" DKIM-Filter: OpenDKIM Filter v2.11.0 ms.lwn.net B1293410B5 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lwn.net; s=20201203; t=1778706129; bh=dTCLX34NNtsHVUB3KTt0hv/TciN7kdQPR191K7i/u/c=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=pSV2QSNGIXoYcVCjh2DBP4E8cOAPfrKXRDzQvzbuRXPQPmezZuML4u0DAvTrF5GXQ PhDTDM/P0exezDUNMcyLzm7rcDg3OY+hHje/fZouQ29sRvxSgU9Sqo7dX1Cdyu8KWL AXypaEy7BwJfjNSv8Rq6iV2N5u7W/F1P4Qjwf+3oXB8iFEbGnP2Jhdos+15Vx4uwdb nQI0M4v/AVeBn4BFaV/aUXWvPvdJFcRMBVul/toYhP08kJF80VMVyqzYeu394weAL+ BU3TrEYe0uy8oUVNhSZoDKewFS0WeZ44D42DbGskkLtX0JHNtNPesqgOdB9Ob78+YL CcpseXb2bKCHg== Received: from localhost (unknown [IPv6:2601:280:4600:27b::1fe]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature ECDSA (prime256v1) server-digest SHA256) (No client certificate requested) by ms.lwn.net (Postfix) with ESMTPSA id B1293410B5; Wed, 13 May 2026 21:02:09 +0000 (UTC) From: Jonathan Corbet To: Willy Tarreau , Greg KH Cc: Leon Romanovsky , skhan@linuxfoundation.org, security@kernel.org, workflows@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3 3/3] Documentation: security-bugs: clarify requirements for AI-assisted reports In-Reply-To: <87a4u3mpxk.fsf@trenco.lwn.net> References: <20260509094755.2838-1-w@1wt.eu> <20260509094755.2838-4-w@1wt.eu> <87se7wo861.fsf@trenco.lwn.net> <2026051353-apricot-kleenex-fa57@gregkh> <87a4u3mpxk.fsf@trenco.lwn.net> Date: Wed, 13 May 2026 15:02:08 -0600 Message-ID: <87ik8r6n1r.fsf@trenco.lwn.net> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain Jonathan Corbet writes: > Willy Tarreau writes: > >> On Wed, May 13, 2026 at 12:30:10PM +0200, Greg KH wrote: >>> > One nit: >>> > >>> > > + * **Impact Evaluation**: Many AI-generated reports lack an understanding of >>> > > + the kernel's threat model and go to great lengths inventing theoretical >>> > > + consequences. >>> > >>> > If only we had a shiny new document describing that threat model that we >>> > could reference here... :) >>> >>> Ah yes, a link to that would make things better, but don't we have that >>> elsewhere in this series? >> >> It's in the same patch, I think Jon was sarcastic here. I thought I had >> addressed that one but apparently I was wrong :-/ > > I'm just saying that this particular text should link to that document, > don't make readers go searching for it. I can certainly add a patch > doing that if you like. I was thinking something like this. jon >From 3f02a3c190bab6b54e2a250ead0c7408af1a3c51 Mon Sep 17 00:00:00 2001 From: Jonathan Corbet Date: Wed, 13 May 2026 14:51:29 -0600 Subject: [PATCH 1/2] docs: security-bugs: add a link to the threat-model documentation Rather than make readers search for this document, just a link to it where it is referenced. (While I was at it, I removed the unused and unneeded _threatmodel label from the top of threat-model.rst). Signed-off-by: Jonathan Corbet --- Documentation/process/security-bugs.rst | 13 +++++++------ Documentation/process/threat-model.rst | 2 -- 2 files changed, 7 insertions(+), 8 deletions(-) diff --git a/Documentation/process/security-bugs.rst b/Documentation/process/security-bugs.rst index f85c65f31f12f..3c51ddde31dd9 100644 --- a/Documentation/process/security-bugs.rst +++ b/Documentation/process/security-bugs.rst @@ -191,12 +191,13 @@ handle: Please **always convert your report to plain text** without any formatting decorations before sending it. - * **Impact Evaluation**: Many AI-generated reports lack an understanding of - the kernel's threat model and go to great lengths inventing theoretical - consequences. This adds noise and complicates triage. Please stick to - verifiable facts (e.g., "this bug permits any user to gain CAP_NET_ADMIN") - without enumerating speculative implications. Have your tool read this - documentation as part of the evaluation process. + * **Impact Evaluation**: Many AI-generated reports lack an understanding + of the kernel's threat model (see Documentation/process/threat-model.rst) + and go to great lengths inventing theoretical consequences. This adds + noise and complicates triage. Please stick to verifiable facts (e.g., + "this bug permits any user to gain CAP_NET_ADMIN") without enumerating + speculative implications. Have your tool read this documentation as + part of the evaluation process. * **Reproducer**: AI-based tools are often capable of generating reproducers. Please always ensure your tool provides one and **test it thoroughly**. If diff --git a/Documentation/process/threat-model.rst b/Documentation/process/threat-model.rst index ecb432390e792..91da52f7114fd 100644 --- a/Documentation/process/threat-model.rst +++ b/Documentation/process/threat-model.rst @@ -1,5 +1,3 @@ -.. _threatmodel: - The Linux Kernel threat model ============================= -- 2.53.0