From: Willy Tarreau <w@1wt.eu>
To: Jonathan Corbet <corbet@lwn.net>
Cc: Greg KH <greg@kroah.com>, Leon Romanovsky <leon@kernel.org>,
skhan@linuxfoundation.org, security@kernel.org,
workflows@vger.kernel.org, linux-doc@vger.kernel.org,
linux-kernel@vger.kernel.org
Subject: Re: [PATCH v3 2/3] Documentation: security-bugs: explain what is and is not a security bug
Date: Thu, 14 May 2026 06:32:24 +0200 [thread overview]
Message-ID: <agVQWKR63Nqs8rp-@1wt.eu> (raw)
In-Reply-To: <87fr3v6my2.fsf@trenco.lwn.net>
Hi Jon,
On Wed, May 13, 2026 at 03:04:21PM -0600, Jonathan Corbet wrote:
> Willy Tarreau <w@1wt.eu> writes:
>
> > On Wed, May 13, 2026 at 06:52:00AM -0600, Jonathan Corbet wrote:
>
> >> I definitely wouldn't argue for making it longer, and enumerating all of
> >> the make-me-root capabilities would be silly. I would consider just
> >> replacing CAP_SYS_ADMIN with "elevated capabilities" or some such. That
> >> might rule out legitimate reports where some capability provides an
> >> access it shouldn't, but I suspect you could live with that :)
> >
> > I think it could indeed work like this, without denaturating the rest
> > of the paragraph and having broader coverage. Do you think you could
> > amend/update it ? I'm not trying to add you any burden, it's just that
> > it will take me more time before I provide an update :-/
>
> How's the following?
Looks good, thank you! In case this is needed:
Acked-by: Willy Tarreau <w@1wt.eu>
> (While I was there, I noticed that threat-model.rst has no SPDX line;
> what's your preference there?)
I didn't notice any was needed, I tried to get inspiration from other
files for the format (I'm still not familiar with the rst format
though this time I could successfully install the tools). Same for
the label at the top BTW, I just did what I found somewhere else,
probably security-bugs.rst which is similar (no SPDX line and has a
label). So regarding SPDX, I do not have any preference. If one is
needed, let's pick what's used by default, I do not care, as long
as it allows the doc to be published.
Thanks,
Willy
> Thanks,
>
> jon
>
> >From 1e15a25142583e312dcc504b0279d47508cbfdab Mon Sep 17 00:00:00 2001
> From: Jonathan Corbet <corbet@lwn.net>
> Date: Wed, 13 May 2026 14:58:53 -0600
> Subject: [PATCH 2/2] docs: threat-model: don't limit root capabilities to
> CAP_SYS_ADMIN
>
> The threat-model document says that only users with CAP_SYS_ADMIN can carry
> out a number of admin-level tasks, but there are numerous capabilities that
> can confer that sort of power. Generalize the text slightly to make it
> clear that CAP_SYS_ADMIN is not the only all-powerful capability.
>
> Signed-off-by: Jonathan Corbet <corbet@lwn.net>
> ---
> Documentation/process/threat-model.rst | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
> diff --git a/Documentation/process/threat-model.rst b/Documentation/process/threat-model.rst
> index 91da52f7114fd..f177b8d3c1caf 100644
> --- a/Documentation/process/threat-model.rst
> +++ b/Documentation/process/threat-model.rst
> @@ -62,7 +62,8 @@ on common processors featuring privilege levels and memory management units:
>
> * **Capability-based protection**:
>
> - * users not having the ``CAP_SYS_ADMIN`` capability may not alter the
> + * users not having elevated capabilities (including but not limited to
> + CAP_SYS_ADMIN) may not alter the
> kernel's configuration, memory nor state, change other users' view of the
> file system layout, grant any user capabilities they do not have, nor
> affect the system's availability (shutdown, reboot, panic, hang, or making
> --
> 2.53.0
next prev parent reply other threads:[~2026-05-14 4:32 UTC|newest]
Thread overview: 33+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-05-09 9:47 [PATCH v3 0/3] Documentation: security-bugs: new updates covering triage and AI Willy Tarreau
2026-05-09 9:47 ` [PATCH v3 1/3] Documentation: security-bugs: do not systematically Cc the security team Willy Tarreau
2026-05-09 9:47 ` [PATCH v3 2/3] Documentation: security-bugs: explain what is and is not a security bug Willy Tarreau
2026-05-09 19:51 ` Shuah Khan
2026-05-11 17:28 ` Greg KH
2026-05-11 18:03 ` Willy Tarreau
2026-05-11 18:39 ` Jonathan Corbet
2026-05-11 20:26 ` Willy Tarreau
2026-05-11 20:42 ` Jonathan Corbet
2026-05-12 5:46 ` Greg KH
2026-05-12 5:54 ` Willy Tarreau
2026-05-12 17:20 ` Jonathan Corbet
2026-05-13 10:29 ` Greg KH
2026-05-13 11:23 ` Willy Tarreau
2026-05-13 12:52 ` Jonathan Corbet
2026-05-13 13:00 ` Willy Tarreau
2026-05-13 21:04 ` Jonathan Corbet
2026-05-14 4:32 ` Willy Tarreau [this message]
2026-05-14 12:22 ` Jonathan Corbet
2026-05-14 13:13 ` Willy Tarreau
2026-05-09 9:47 ` [PATCH v3 3/3] Documentation: security-bugs: clarify requirements for AI-assisted reports Willy Tarreau
2026-05-12 17:21 ` Jonathan Corbet
2026-05-13 10:30 ` Greg KH
2026-05-13 11:24 ` Willy Tarreau
2026-05-13 12:53 ` Jonathan Corbet
2026-05-13 12:58 ` Willy Tarreau
2026-05-13 21:02 ` Jonathan Corbet
2026-05-14 4:34 ` Willy Tarreau
2026-05-14 7:23 ` Greg KH
2026-05-09 10:52 ` [PATCH v3 0/3] Documentation: security-bugs: new updates covering triage and AI Leon Romanovsky
2026-05-09 10:56 ` Willy Tarreau
2026-05-12 17:14 ` Jonathan Corbet
2026-05-12 19:13 ` Willy Tarreau
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=agVQWKR63Nqs8rp-@1wt.eu \
--to=w@1wt.eu \
--cc=corbet@lwn.net \
--cc=greg@kroah.com \
--cc=leon@kernel.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=security@kernel.org \
--cc=skhan@linuxfoundation.org \
--cc=workflows@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.