Kernel code removals driven by LLM-created security reports

Reasons for kernel code removal

  • Many removed subsystems are effectively unmaintained: few or no familiar developers, fixes driven almost entirely by static analysis, and unclear real-world users.
  • LLM-generated security reports dramatically increased the volume of bugs found in this old code, forcing maintainers to either own it or drop it.
  • Unmaintained kernel code is framed as technical debt and a concrete security risk in a 2026 threat environment, especially for local privilege-escalation vectors via obscure drivers.
  • Some see this as “tree shaking” of the kernel: rarely used modules get pushed out, reducing attack surface for everyone else.

Legacy hardware and niche use cases

  • Debate over whether technologies like ISDN and AX.25 are still used:
    • One side claims telco retirement and IP migration make them effectively dead.
    • Others cite continued use in broadcasting, voiceover work, ham radio, industrial systems, and low‑bandwidth sensor links.
  • Concerns that niche users (industrial PCI capture cards, old NICs, HAM protocols) are “completely broken” when support disappears.
  • Suggestions:
    • Move such drivers out-of-tree or into separate module trees.
    • Have a “hobbyist kernel” or clear “unmaintained/insecure” config flags.
    • Counterpoint: Linux’s unstable in-kernel driver APIs make out-of-tree maintenance painful.

LLMs as vulnerability finders

  • Some argue modern LLMs are now very effective for legacy C security:
    • Large numbers of real bugs found in major projects (e.g., Firefox, kernels, curl), especially classic memory-safety issues.
    • They scale cheaply across huge codebases; humans previously “weren’t looking” in many places.
  • Others emphasize:
    • High false-positive rates, hallucinations, and need for skilled human triage.
    • Risk of spammy, low-quality reports from users overconfident in LLM output.
  • Consensus elements:
    • LLMs are useful amplifiers for professional security work and exploit development.
    • They do not eliminate the need for expert reviewers.

Security, architecture, and philosophy

  • Broad agreement that “code is attack surface”; reducing kernel complexity is good.
  • Strong push toward moving protocol/stateful logic (e.g., network stacks, HAM protocols) into userspace daemons; some see this as belated validation of microkernel ideas.
  • Disagreement over performance costs of userspace networking and whether they matter for very slow links like AX.25.
  • Philosophical split:
    • One camp prioritizes security and maintainability, accepting removal and “won’t fix.”
    • Another prioritizes longevity and reuse of old hardware, seeing Linux as drifting toward corporate/PR priorities and increasing e‑waste.