Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp3368321pxu; Mon, 19 Oct 2020 10:17:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz771wroXHCg8XAk2VRoAnIjdNrjwP9prrPQOHnH9h8qy/LODbeWdGDDkMhCFKRqxTCZnVj X-Received: by 2002:a17:906:9389:: with SMTP id l9mr925004ejx.462.1603127830634; Mon, 19 Oct 2020 10:17:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603127830; cv=none; d=google.com; s=arc-20160816; b=QX7MqpB+tuEK6/NWXt3kfPQcHqIUXCx2wFi+BFuUZCaC4mA+FALVhUoESj60deWXvz FVBF0yZVnRiaQaRRUe8ms1PjLZW8ak4a1Pg8TSqM86cxfCg5WoqOmzgxdy3feLvZPqWk UfAEgx0GKhqsJegJDYJSu/VoipQnFKj9ozClSy/xQbcqiwHc3wfGd6kKORAyuAskS67u XJmKikx5hYIvbjEhVye56YgqpL+IJ3IQUqbuYLPLF2ehEunc2vbdJwrQ0T1MqxIxGYJx F17HXIBm1fNl8RtBydPak3Tf14zfyO9+mfx1cgsiBrHeQeujHyYvlWcphJYdVtFRw8hv Utew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :mime-version:user-agent:date:message-id:organization:subject:from :cc:to:ironport-sdr:ironport-sdr; bh=aEmUU6uX01pAk+YktVE0DlqvypA3QwYYfmEIIc8gimM=; b=gKCOMyapSPFGaM+KUu9jz2ARVX3VihCWZ7SF4iulqb4tCbAbO4CkGUTG9FCwVgfDOU iKtLBy+yA6wzZk8zck+s2KuYxJ9NoCTN1X740LWVF3ZOIF6RcVCsJJuHbxiy1M6N/N/j ERzemecyx0DLXXP1tE9weYTQejq18WYm+yEvy0UqhbAmDbHKZPjVmOx4HMwcVj70PfkT ng34MBPOyzrtcFUbSgtjsaKYL4IKYWsiOgKkcg87/+KJ3k6tvuMna0qhRQ8NNG1QzMOW ypJ9cccj+SVrDBw11Cf8rXFTykBVMN4riXnwAC4LoGM9XxcRqVL//xPOtf1yPUsKKQ/u daMA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y19si510112eje.678.2020.10.19.10.16.48; Mon, 19 Oct 2020 10:17:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730969AbgJSRPT (ORCPT + 99 others); Mon, 19 Oct 2020 13:15:19 -0400 Received: from mga04.intel.com ([192.55.52.120]:16780 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730916AbgJSRPS (ORCPT ); Mon, 19 Oct 2020 13:15:18 -0400 IronPort-SDR: TMX75HHvmM17sI5xu8PhlUIylQ2L07HCbTI5NbfLxQtB8Dwhm2jA7ks83db6buJ379Cegu+e0d m5k0VqgFMMKg== X-IronPort-AV: E=McAfee;i="6000,8403,9779"; a="164452983" X-IronPort-AV: E=Sophos;i="5.77,395,1596524400"; d="scan'208";a="164452983" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Oct 2020 10:15:18 -0700 IronPort-SDR: zztlWtPnO0hkZnEZM6GvxuFL5EpOoodW962nrIh4G95ofhk4hmT6X33InveHGJc+bAJEJbA9ab bJn1ihmziqFQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.77,395,1596524400"; d="scan'208";a="347510691" Received: from linux.intel.com ([10.54.29.200]) by fmsmga004.fm.intel.com with ESMTP; 19 Oct 2020 10:15:18 -0700 Received: from [10.249.225.38] (abudanko-mobl.ccr.corp.intel.com [10.249.225.38]) by linux.intel.com (Postfix) with ESMTP id DEAD1580127; Mon, 19 Oct 2020 10:15:15 -0700 (PDT) To: Arnaldo Carvalho de Melo Cc: Jiri Olsa , Namhyung Kim , Alexander Shishkin , Andi Kleen , Peter Zijlstra , Ingo Molnar , linux-kernel , "linux-security-module@vger.kernel.org" , "linux-doc@vger.kernel.org" , linux-man@vger.kernel.org From: Alexey Budankov Subject: [PATCH v1 0/2] doc/admin-guide: update perf-security.rst with CAP_PERFMON usage flows Organization: Intel Corp. Message-ID: <161a51d3-7cdf-f9ee-c438-42bb7404693e@linux.intel.com> Date: Mon, 19 Oct 2020 20:15:14 +0300 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.12.1 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Assignment of CAP_PERFMON [1] Linux capability to an executable located on a file system requires extended attributes (xattrs) [2] to be supported by the file system. Even if the file system supports xattrs an fs device should be mounted with permission to use xattrs for files located on the device (e.g. without nosuid option [3]). No xattrs support and nosuid mounts are quite common in HPC and Cloud multiuser environments thus applicability of privileged Perf user groups based on file capabilities [4] is limited in that environments. Alternative method to confer Linux capabilities into a process does still exist and it is thru creation of capabilities-enabled-semi-privileged shell environment. Usage of this method to extend privileged Perf user groups approach is documented in this patch set as an extension to perf-security.rst admin guide file. [1] https://man7.org/linux/man-pages/man7/capabilities.7.html [2] https://man7.org/linux/man-pages/man7/xattr.7.html [3] https://man7.org/linux/man-pages/man8/mount.8.html [4] https://www.kernel.org/doc/html/latest/admin-guide/perf-security.html#privileged-perf-users-groups --- Alexey Budankov (2): doc/admin-guide: note credentials consolidation under CAP_PERFMON doc/admin-guide: document creation of CAP_PERFMON privileged shell Documentation/admin-guide/perf-security.rst | 81 ++++++++++++++++++--- 1 file changed, 70 insertions(+), 11 deletions(-) -- 2.24.1