Hi Jon,

On Wed, May 13, 2026 at 03:04:21PM -0600, Jonathan Corbet wrote:
> Willy Tarreau <[email protected]> writes:
> 
> > On Wed, May 13, 2026 at 06:52:00AM -0600, Jonathan Corbet wrote:
> 
> >> I definitely wouldn't argue for making it longer, and enumerating all of
> >> the make-me-root capabilities would be silly.  I would consider just
> >> replacing CAP_SYS_ADMIN with "elevated capabilities" or some such.  That
> >> might rule out legitimate reports where some capability provides an
> >> access it shouldn't, but I suspect you could live with that :)
> >
> > I think it could indeed work like this, without denaturating the rest
> > of the paragraph and having broader coverage. Do you think you could
> > amend/update it ? I'm not trying to add you any burden, it's just that
> > it will take me more time before I provide an update :-/
> 
> How's the following?

Looks good, thank you! In case this is needed:

  Acked-by: Willy Tarreau <[email protected]>

> (While I was there, I noticed that threat-model.rst has no SPDX line;
> what's your preference there?)

I didn't notice any was needed, I tried to get inspiration from other
files for the format (I'm still not familiar with the rst format
though this time I could successfully install the tools). Same for
the label at the top BTW, I just did what I found somewhere else,
probably security-bugs.rst which is similar (no SPDX line and has a
label). So regarding SPDX, I do not have any preference. If one is
needed, let's pick what's used by default, I do not care, as long
as it allows the doc to be published.

Thanks,
Willy

> Thanks,
> 
> jon
> 
> >From 1e15a25142583e312dcc504b0279d47508cbfdab Mon Sep 17 00:00:00 2001
> From: Jonathan Corbet <[email protected]>
> Date: Wed, 13 May 2026 14:58:53 -0600
> Subject: [PATCH 2/2] docs: threat-model: don't limit root capabilities to
>  CAP_SYS_ADMIN
> 
> The threat-model document says that only users with CAP_SYS_ADMIN can carry
> out a number of admin-level tasks, but there are numerous capabilities that
> can confer that sort of power.  Generalize the text slightly to make it
> clear that CAP_SYS_ADMIN is not the only all-powerful capability.
> 
> Signed-off-by: Jonathan Corbet <[email protected]>
> ---
>  Documentation/process/threat-model.rst | 3 ++-
>  1 file changed, 2 insertions(+), 1 deletion(-)
> 
> diff --git a/Documentation/process/threat-model.rst 
> b/Documentation/process/threat-model.rst
> index 91da52f7114fd..f177b8d3c1caf 100644
> --- a/Documentation/process/threat-model.rst
> +++ b/Documentation/process/threat-model.rst
> @@ -62,7 +62,8 @@ on common processors featuring privilege levels and memory 
> management units:
>  
>  * **Capability-based protection**:
>  
> -  * users not having the ``CAP_SYS_ADMIN`` capability may not alter the
> +  * users not having elevated capabilities (including but not limited to
> +    CAP_SYS_ADMIN) may not alter the
>      kernel's configuration, memory nor state, change other users' view of the
>      file system layout, grant any user capabilities they do not have, nor
>      affect the system's availability (shutdown, reboot, panic, hang, or 
> making
> -- 
> 2.53.0

Reply via email to