Received: by 10.213.65.68 with SMTP id h4csp1669191imn; Mon, 19 Mar 2018 10:06:42 -0700 (PDT) X-Google-Smtp-Source: AG47ELtKagD2GnIRGThAM1mpMu6AW57upDc4BaFLGGZYCQwA2tnS5VQh2CDOBU8eytzAQ8Z660cu X-Received: by 10.99.138.202 with SMTP id y193mr9605270pgd.224.1521479202809; Mon, 19 Mar 2018 10:06:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521479202; cv=none; d=google.com; s=arc-20160816; b=n8rK3AJQlzNuhVeXOXF04JFWQmLRRcb2Y/oy6Oyp3GJHryoatu0YZ8nTK8Q7vJFlDF fU5qeVLqElSCP/JwXD4ev+WmcTOothjU5Gtg3sB+eGag2TgAgfsvn7k9BsbijqwOba0K Ga25dn1+ewjOyw5lTb/rtf0Iq2kzjxyR/Z5TzXNsBj7OiMj4QwuIRebXQB3JA7qtqorw EnnOh9EY2rlHZF7J881IxKMZVNPmL7lawgEYAskZPUiUbHJu9LFfdyX82DNOkBwxdBl5 YaU7qLeHdj1zbC93PbekTbkYx7uZ35x6qqPVw9RpSWNqjMUMLndlBzgBhHc/fxaDVQWm JR2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:organization:message-id:date:subject:cc:to :from:arc-authentication-results; bh=n7zzaIlgdXHdQrq3G0bkVo4Gfh2rFjolCFnL0L1YPNw=; b=LVERqTiHI08MQbpZGMN/Mh0Ejwx4xNtheejt1d5xmGLwWEI7ilKSaRQaadnxIlcsMs QnR1YBaRl14s/0lGs4z7dlr9IEemOpHcYUCyio2AcFNC7svlm1eoIXAzdtWr1jjUUzqM B1KJj30m0FmAQQ6RrtlL8DnNMXT+1Hq2r+YqsiIoIeSOQ8IYLllGiN94upAazd/KaWvB UDQUDu+LmenDGc/nu9oku4bCndHxt21JgQeOAdpqIKnPNa1cyZNIbE/vyDMYrW/RUm1c vrAa/bTESGGU6abFVhehsG8Aqu9oGbobfLqLaze3Xj9z18eLK7u44G3Oo6EWiSJv7Bt3 iANg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f62-v6si275142plb.313.2018.03.19.10.06.27; Mon, 19 Mar 2018 10:06:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S967747AbeCSREo (ORCPT + 99 others); Mon, 19 Mar 2018 13:04:44 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:57856 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S967697AbeCSREj (ORCPT ); Mon, 19 Mar 2018 13:04:39 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id CDB3C4270949; Mon, 19 Mar 2018 17:04:38 +0000 (UTC) Received: from x2.localnet (ovpn-123-76.rdu2.redhat.com [10.10.123.76]) by smtp.corp.redhat.com (Postfix) with ESMTP id 5341C202322C; Mon, 19 Mar 2018 17:04:38 +0000 (UTC) From: Steve Grubb To: Jiri Kosina Cc: Andy Lutomirski , Paul Moore , linux-audit@redhat.com, Andrew Morton , Michal Hocko , Oleg Nesterov , LKML Subject: Re: [PATCH] audit: set TIF_AUDIT_SYSCALL only if audit filter has been populated Date: Mon, 19 Mar 2018 13:04:38 -0400 Message-ID: <1768479.at3cVp0HA2@x2> Organization: Red Hat In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Mon, 19 Mar 2018 17:04:38 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Mon, 19 Mar 2018 17:04:38 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'sgrubb@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tuesday, March 13, 2018 8:28:57 PM EDT Jiri Kosina wrote: > On Wed, 14 Mar 2018, Andy Lutomirski wrote: > > > Yes...I wished I was in on the beginning of this discussion. Here's the > > > problem. We need all tasks auditable unless specifically dismissed as > > > uninteresting. This would be a task,never rule. > > > > > > The way we look at it, is if it boots with audit=1, then we know auditd > > > is expected to run at some point. So, we need all tasks to stay > > > auditable. If they weren't and auditd enabled auditing, then we'd need > > > to walk the whole proctable and stab TIF_AUDIT_SYSCALL into every > > > process in the system. It was decided that this is too ugly. > > > > When was that decided? That's what this patch does. > > I'd like to see some more justification as well. There was some discussion about removing the flag here: https://www.redhat.com/archives/linux-audit/2007-October/msg00053.html -Steve > Namely, if I compare "setting TIF_AUDIT_SYSCALL for every process on a > need-to-be-so basis" to "we always go through the slow path and > pessimistically assume that audit is enabled and has reasonable ruleset > loaded", I have my own (different) opinion of what is too ugly.