From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steven Rostedt Subject: Re: [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF Date: Thu, 29 Aug 2019 13:49:06 -0400 Message-ID: <20190829134906.7ecae4e2@gandalf.local.home> References: <20190827205213.456318-1-ast@kernel.org> <20190828071421.GK2332@hirez.programming.kicks-ass.net> <20190828220826.nlkpp632rsomocve@ast-mbp.dhcp.thefacebook.com> <20190829093434.36540972@gandalf.local.home> <20190829172309.xd73ax4wgsjmv6zg@ast-mbp.dhcp.thefacebook.com> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20190829172309.xd73ax4wgsjmv6zg@ast-mbp.dhcp.thefacebook.com> Sender: netdev-owner@vger.kernel.org To: Alexei Starovoitov Cc: Andy Lutomirski , Peter Zijlstra , Alexei Starovoitov , Kees Cook , LSM List , James Morris , Jann Horn , Masami Hiramatsu , "David S. Miller" , Daniel Borkmann , Network Development , bpf , kernel-team , Linux API List-Id: linux-api@vger.kernel.org On Thu, 29 Aug 2019 10:23:10 -0700 Alexei Starovoitov wrote: > > CAP_TRACE_KERNEL: Use all of perf, ftrace, kprobe, etc. > > > > CAP_TRACE_USER: Use all of perf with scope limited to user mode and uprobes. > > imo that makes little sense from security pov, since > such CAP_TRACE_KERNEL (ex kprobe) can trace "unrelated user process" > just as well. Yet not letting it do cleanly via uprobe. > Sort of like giving a spare key for back door of the house and > saying no, you cannot have main door key. I took it as CAP_TRACE_KERNEL as a superset of CAP_TRACE_USER. That is, if you have CAP_TRACE_KERNEL, by default you get USER. Where as CAP_TRACE_USER, is much more limiting. -- Steve