[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160624163527.GZ3262@mtj.duckdns.org>
Date: Fri, 24 Jun 2016 12:35:27 -0400
From: Tejun Heo <tj@...nel.org>
To: "Serge E. Hallyn" <serge@...lyn.com>
Cc: Topi Miettinen <toiwoton@...il.com>, linux-kernel@...r.kernel.org,
luto@...nel.org, keescook@...omium.org,
Jonathan Corbet <corbet@....net>,
Li Zefan <lizefan@...wei.com>,
Johannes Weiner <hannes@...xchg.org>,
Serge Hallyn <serge.hallyn@...onical.com>,
James Morris <james.l.morris@...cle.com>,
Andrew Morton <akpm@...ux-foundation.org>,
David Howells <dhowells@...hat.com>,
David Woodhouse <David.Woodhouse@...el.com>,
Ard Biesheuvel <ard.biesheuvel@...aro.org>,
"Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>,
Petr Mladek <pmladek@...e.com>,
"open list:DOCUMENTATION" <linux-doc@...r.kernel.org>,
"open list:CONTROL GROUP (CGROUP)" <cgroups@...r.kernel.org>,
"open list:CAPABILITIES" <linux-security-module@...r.kernel.org>
Subject: Re: [PATCH] capabilities: add capability cgroup controller
Hello,
On Fri, Jun 24, 2016 at 10:59:16AM -0500, Serge E. Hallyn wrote:
> Quoting Tejun Heo (tj@...nel.org):
> > But isn't being recursive orthogonal to using cgroup? Why not account
> > usages recursively along the process hierarchy? Capabilities don't
> > have much to do with cgroup but everything with process hierarchy.
> > That's how they're distributed and modified. If monitoring their
> > usages is necessary, it makes sense to do it in the same structure.
>
> That was my argument against using cgroups to enforce a new bounding
> set. For tracking though, the cgroup process tracking seems as applicable
> to this as it does to systemd tracking of services. It tracks a task and
> the children it forks.
Just monitoring is less jarring than implementing security enforcement
via cgroup, but it is still jarring. What's wrong with recursive
process hierarchy monitoring which is in line with the whole facility
is implemented anyway?
Thanks.
--
tejun
Powered by blists - more mailing lists