Re: [PATCH] capabilities: audit capability use

2016-07-13 Thread Topi Miettinen
On 07/12/16 13:16, Eric W. Biederman wrote: > Topi Miettinen writes: > >> On 07/11/16 21:57, Eric W. Biederman wrote: >>> Topi Miettinen writes: >>> There are many basic ways to control processes, including capabilities, cgroups and resource limits. However, there are far fewer ways to

Re: [PATCH] capabilities: audit capability use

2016-07-12 Thread Topi Miettinen
On 07/12/16 14:59, Tejun Heo wrote: > On Mon, Jul 11, 2016 at 07:47:44PM +, Topi Miettinen wrote: >> It's really critical to be able to associate a task in the logs to >> cgroups which were valid that time. Or can we infer somehow what cgroups > > When is "that time"? Without logging all oper

Re: [PATCH] capabilities: audit capability use

2016-07-12 Thread Paul Moore
On Tue, Jul 12, 2016 at 9:16 AM, Eric W. Biederman wrote: > Not logging capabilities outside of the initial user namespace is > certainly the conservative place to start, and what selinux does. FYI, we added some basic userns capability smarts to SELinux in Linux 4.7. commit 8e4ff6f228e4722cac

Re: [PATCH] capabilities: audit capability use

2016-07-12 Thread Paul Moore
On Mon, Jul 11, 2016 at 7:14 AM, Topi Miettinen wrote: > There are many basic ways to control processes, including capabilities, > cgroups and resource limits. However, there are far fewer ways to find > out useful values for the limits, except blind trial and error. > > Currently, there is no way

Re: [PATCH] capabilities: audit capability use

2016-07-12 Thread Tejun Heo
On Mon, Jul 11, 2016 at 07:47:44PM +, Topi Miettinen wrote: > It's really critical to be able to associate a task in the logs to > cgroups which were valid that time. Or can we infer somehow what cgroups When is "that time"? Without logging all operations, this is meaningless. > a task was t

Re: [PATCH] capabilities: audit capability use

2016-07-12 Thread Eric W. Biederman
Topi Miettinen writes: > On 07/11/16 21:57, Eric W. Biederman wrote: >> Topi Miettinen writes: >> >>> There are many basic ways to control processes, including capabilities, >>> cgroups and resource limits. However, there are far fewer ways to find >>> out useful values for the limits, except b

Re: [PATCH] capabilities: audit capability use

2016-07-12 Thread Topi Miettinen
On 07/11/16 21:57, Eric W. Biederman wrote: > Topi Miettinen writes: > >> There are many basic ways to control processes, including capabilities, >> cgroups and resource limits. However, there are far fewer ways to find >> out useful values for the limits, except blind trial and error. >> >> Curr

Re: [PATCH] capabilities: audit capability use

2016-07-11 Thread Eric W. Biederman
Topi Miettinen writes: > There are many basic ways to control processes, including capabilities, > cgroups and resource limits. However, there are far fewer ways to find > out useful values for the limits, except blind trial and error. > > Currently, there is no way to know which capabilities are

Re: [PATCH] capabilities: audit capability use

2016-07-11 Thread Topi Miettinen
On 07/11/16 17:09, Tejun Heo wrote: > Hello, > > On Mon, Jul 11, 2016 at 02:14:31PM +0300, Topi Miettinen wrote: >> [ 28.443674] audit: type=1327 audit(1468234333.144:520): >> proctitle=6D6B6E6F64002F6465762F7A5F343639006300310032 >> [ 28.465888] audit: type=1330 audit(1468234333.144:520): >

Re: [PATCH] capabilities: audit capability use

2016-07-11 Thread Topi Miettinen
On 07/11/16 16:05, Topi Miettinen wrote: > On 07/11/16 15:25, Serge E. Hallyn wrote: >> Quoting Topi Miettinen (toiwo...@gmail.com): >>> There are many basic ways to control processes, including capabilities, >>> cgroups and resource limits. However, there are far fewer ways to find >>> out useful

Re: [PATCH] capabilities: audit capability use

2016-07-11 Thread Tejun Heo
Hello, On Mon, Jul 11, 2016 at 02:14:31PM +0300, Topi Miettinen wrote: > [ 28.443674] audit: type=1327 audit(1468234333.144:520): > proctitle=6D6B6E6F64002F6465762F7A5F343639006300310032 > [ 28.465888] audit: type=1330 audit(1468234333.144:520): > cap_used=0800 > [ 28.482080] a

Re: [PATCH] capabilities: audit capability use

2016-07-11 Thread Topi Miettinen
On 07/11/16 15:25, Serge E. Hallyn wrote: > Quoting Topi Miettinen (toiwo...@gmail.com): >> There are many basic ways to control processes, including capabilities, >> cgroups and resource limits. However, there are far fewer ways to find >> out useful values for the limits, except blind trial and e

Re: [PATCH] capabilities: audit capability use

2016-07-11 Thread Serge E. Hallyn
Quoting Topi Miettinen (toiwo...@gmail.com): > There are many basic ways to control processes, including capabilities, > cgroups and resource limits. However, there are far fewer ways to find > out useful values for the limits, except blind trial and error. > > Currently, there is no way to know w

Re: [PATCH] capabilities: audit capability use

2016-07-03 Thread kbuild test robot
Hi, [auto build test ERROR on cgroup/for-next] [also build test ERROR on v4.7-rc5] [cannot apply to next-20160701] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day-ci/linux/commits/Topi-Miettinen/capabilities-audi