Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp4507447ybv; Mon, 17 Feb 2020 00:11:24 -0800 (PST) X-Google-Smtp-Source: APXvYqzltss72F8PYd+AbzfXyllUUGuiw9hfC8+SbN+E6nidD+X2PtAt1z9riTPkBidyeHlS9Dmx X-Received: by 2002:a05:6830:1e2b:: with SMTP id t11mr11420492otr.81.1581927084456; Mon, 17 Feb 2020 00:11:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581927084; cv=none; d=google.com; s=arc-20160816; b=fcT6oSfQQV8WzDZHEjiaoAlnXG7FbiJZAKMhb5cCqslaXRaJK7nAOWWz7uWJNlXOnw xMSNjdLTcfrU+PE9mwNAvtNimdHxiXqB1PX3IAi1RPhyIgDj/muXb63PWp42nkF8QXi+ LQYmwY0dtl5mMHkeRTiRsIY+BwJTVaWFUnsFEIC05mqhYdc6fTqzMa+ojmGqN3643NiQ 6ou5Fhw7dmHaQEFEb+CPhn4yQoZDqEx8PnL6Ie3dV5pcoLzuexbgArd9QgmJvGQ4cJVk PPrnUkPTdxw7eZw4/KZWeXZV0J4v5u870qXGBe235XnyOP+gZULECqg3kBZDyY0lfzWC zJfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:references:cc:to:from:subject; bh=VNxWcmFoNG3IizNHe3B3r0u/Lg5mlKqVxuTlBib7QJk=; b=ioqQNEpoP0a/lYv03fVLJWm1G/U3AANPszy7X+Dnl/1LcyAg2MalXS2CSfupKrHv/t bk7bSowDhYtWE/g34iRSeh8yDtdt5MWWi7F2c12bmrxkrvHXrWOmqfif+ViTK9Ta2urF Ci0eeAfIwvnRrDNorG4LgpAc0CS9C5LitNw7t4yGnhX6No2smjopyyhBNiJiKMUX+9cI rHBSTk9EX1b6iAyFbYNYtpj6JEalUe9nPpofsyPnvInXyZrqBjBB5CruRKwb8lKXmTN3 1dVH66eiDXwMfJ1FUqeF96ZcppgtCIbA0xTGLEocMkP7DlEanPyy/5dcjUZsvJbPL1Dd g3yQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s22si7238032otq.100.2020.02.17.00.11.12; Mon, 17 Feb 2020 00:11:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727986AbgBQILC (ORCPT + 99 others); Mon, 17 Feb 2020 03:11:02 -0500 Received: from mga06.intel.com ([134.134.136.31]:5788 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726932AbgBQILC (ORCPT ); Mon, 17 Feb 2020 03:11:02 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Feb 2020 00:11:01 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.70,451,1574150400"; d="scan'208";a="382108423" Received: from linux.intel.com ([10.54.29.200]) by orsmga004.jf.intel.com with ESMTP; 17 Feb 2020 00:11:01 -0800 Received: from [10.125.252.180] (abudanko-mobl.ccr.corp.intel.com [10.125.252.180]) by linux.intel.com (Postfix) with ESMTP id 71F155804A2; Mon, 17 Feb 2020 00:10:55 -0800 (PST) Subject: [PATCH v7 08/12] parisc/perf: open access for CAP_PERFMON privileged process From: Alexey Budankov To: James Morris , Serge Hallyn , Stephen Smalley , Peter Zijlstra , Arnaldo Carvalho de Melo , Ingo Molnar , "joonas.lahtinen@linux.intel.com" , Alexei Starovoitov , Will Deacon , Paul Mackerras , Helge Deller , Thomas Gleixner Cc: Andi Kleen , Stephane Eranian , Igor Lubashev , Jiri Olsa , linux-kernel , "intel-gfx@lists.freedesktop.org" , "linux-security-module@vger.kernel.org" , "selinux@vger.kernel.org" , linux-arm-kernel , "linuxppc-dev@lists.ozlabs.org" , "linux-parisc@vger.kernel.org" , oprofile-list@lists.sf.net, "linux-doc@vger.kernel.org" , linux-man@vger.kernel.org References: Organization: Intel Corp. Message-ID: <29e45605-7a3c-944b-7bea-5959f8ff0793@linux.intel.com> Date: Mon, 17 Feb 2020 11:10:54 +0300 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Open access to monitoring for CAP_PERFMON privileged process. Providing the access under CAP_PERFMON capability singly, without the rest of CAP_SYS_ADMIN credentials, excludes chances to misuse the credentials and makes operation more secure. CAP_PERFMON implements the principal of least privilege for performance monitoring and observability operations (POSIX IEEE 1003.1e 2.2.2.39 principle of least privilege: A security design principle that states that a process or program be granted only those privileges (e.g., capabilities) necessary to accomplish its legitimate function, and only for the time that such privileges are actually required) For backward compatibility reasons access to the monitoring remains open for CAP_SYS_ADMIN privileged processes but CAP_SYS_ADMIN usage for secure monitoring is discouraged with respect to CAP_PERFMON capability. Signed-off-by: Alexey Budankov --- arch/parisc/kernel/perf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/parisc/kernel/perf.c b/arch/parisc/kernel/perf.c index e1a8fee3ad49..d46b6709ec56 100644 --- a/arch/parisc/kernel/perf.c +++ b/arch/parisc/kernel/perf.c @@ -300,7 +300,7 @@ static ssize_t perf_write(struct file *file, const char __user *buf, else return -EFAULT; - if (!capable(CAP_SYS_ADMIN)) + if (!perfmon_capable()) return -EACCES; if (count != sizeof(uint32_t)) -- 2.20.1