Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp4643547imm; Fri, 18 May 2018 08:22:48 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqRwMqiww9yZ5VIQs5JNt2GqtKQ7WtMJlIz/ldvF8JPwSa3ts3K915aUzLIIP5nBnVZRg+m X-Received: by 2002:a65:6699:: with SMTP id b25-v6mr7851394pgw.191.1526656968020; Fri, 18 May 2018 08:22:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526656967; cv=none; d=google.com; s=arc-20160816; b=Ywr7N4Up2EiR/pWDZdl7R8CoErpxxIXSGl/6ycI/NlDKzzK87uLUbVjqS7AMPzAuYc Kj7OFZIW5t7deRQqxRj+SelOz2nQ03yvUGEqNAdSejdjXTVRobJo/h4X5WVRYpLwq36h p64WOTISYg6VveNRvdgDOojqOyJUgZdOEWbwIwRBb0J5UopFeU9CVkmkDICv9aBuOyAo l1DDC0cd2H7xZsx4zvies1MQLOZDRYElvaRbfW8kINaBwy3u/WDA/spcXD5KoBWDG62I NsEXsUUI1V4bzvPqgr5PzfVaM0PsyfEIRTFqfIkQHmX7PH6XJAPBbxMP+Lrtz03RZPZh qi8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=MwcxdsbnerfmhmsyWRX4ENp9uv5a1y//HPMJaAgImaQ=; b=rT6rvE7dTSyDcqjrez1qlWt40cdrKxZugQc0+1D3IpDxSgItTO93NR9O4CwF2f4sSL zMOb90nWIQSvG2Jyy/Ohg8I4aEIxSTG4/hKCQPpfjTPxlwI8/VgcVWrAEIh8DtHMJ9zU fZw+tSyx64qLYVh28h/my5PToi0f6EvY5Rj/cQ9hmFk5QO+z5lcLoDKVlXpwrpnbnF/J z7gbplLP9un17MMe92vzk1zue/XAPVitTRWfUvMIqArE36b9qQCnXC/6CGJ0lg8ILamS ajkKzGLt/uOZSZPK15vNrWV1l529GPviGv0sQ5AYI0nqGfEr7Xp9p/S8urvBM5IQ0bAS bIVA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k7-v6si7801161pls.368.2018.05.18.08.22.33; Fri, 18 May 2018 08:22:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752443AbeERPWF (ORCPT + 99 others); Fri, 18 May 2018 11:22:05 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:33594 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752334AbeERPVy (ORCPT ); Fri, 18 May 2018 11:21:54 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id F3D6581663CB; Fri, 18 May 2018 15:21:52 +0000 (UTC) Received: from madcap2.tricolour.ca (ovpn-112-24.rdu2.redhat.com [10.10.112.24]) by smtp.corp.redhat.com (Postfix) with ESMTPS id EB01D63F3E; Fri, 18 May 2018 15:21:40 +0000 (UTC) Date: Fri, 18 May 2018 11:21:06 -0400 From: Richard Guy Briggs To: Steve Grubb Cc: cgroups@vger.kernel.org, containers@lists.linux-foundation.org, linux-api@vger.kernel.org, Linux-Audit Mailing List , linux-fsdevel@vger.kernel.org, LKML , netdev@vger.kernel.org, ebiederm@xmission.com, luto@kernel.org, jlayton@redhat.com, carlos@redhat.com, dhowells@redhat.com, viro@zeniv.linux.org.uk, simo@redhat.com, eparis@parisplace.org, serge@hallyn.com Subject: Re: [RFC PATCH ghak32 V2 01/13] audit: add container id Message-ID: <20180518152106.do5b3mu6e6eyvo7q@madcap2.tricolour.ca> References: <20180517170053.7d4afa87@ivy-bridge> <20180517215600.dyswlkvqdtgjwr5y@madcap2.tricolour.ca> <20180518095636.56ff322d@ivy-bridge> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180518095636.56ff322d@ivy-bridge> User-Agent: NeoMutt/20171027 X-Scanned-By: MIMEDefang 2.79 on 10.11.54.5 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Fri, 18 May 2018 15:21:53 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Fri, 18 May 2018 15:21:53 +0000 (UTC) for IP:'10.11.54.5' DOMAIN:'int-mx05.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'rgb@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018-05-18 09:56, Steve Grubb wrote: > On Thu, 17 May 2018 17:56:00 -0400 > Richard Guy Briggs wrote: > > > > During syscall events, the path info is returned in a a record > > > simply called AUDIT_PATH, cwd info is returned in AUDIT_CWD. So, > > > rather than calling the record that gets attached to everything > > > AUDIT_CONTAINER_INFO, how about simply AUDIT_CONTAINER. > > > > Considering the container initiation record is different than the > > record to document the container involved in an otherwise normal > > syscall, we need two names. I don't have a strong opinion what they > > are. > > > > I'd prefer AUDIT_CONTAIN and AUDIT_CONTAINER_INFO so that the two > > are different enough to be visually distinct while leaving > > AUDIT_CONTAINERID for the field type in patch 4 ("audit: add > > containerid filtering") (Sorry, I had intended AUDIT_CONTAINER for the first in that paragraph above.) > How about AUDIT_CONTAINER for the auxiliary record? The one that starts > the container, I don't have a strong opinion on. Could be > AUDIT_CONTAINER_INIT, AUDIT_CONTAINER_START, AUDIT_CONTAINERID, > AUDIT_CONTAINER_ID, or something else. The API call that sets the ID > for filtering could be AUDIT_CID or AUDIT_CONTID if that helps decide > what the initial event might be. Normally, it should match the field > being filtered. Ok, I had shortened the record field name to "contid=" to be unique enough while not using too much netlink bandwidth. I could have used "cid=" but that could be unobvious or ambiguous. I didn't want to use the full "containerid=" due to that. I suppose I could change the field name macro to AUDIT_CONTID. For the one that starts the container, I'd prefer to leave the name a bit more general than "_INIT", "_START", so maybe I'll swap them around and use AUDIT_CONTAINER_INFO for the startup record, and use AUDIT_CONTAINER for the syscall auxiliary record. Does that work? > -Steve - RGB -- Richard Guy Briggs Sr. S/W Engineer, Kernel Security, Base Operating Systems Remote, Ottawa, Red Hat Canada IRC: rgb, SunRaycer Voice: +1.647.777.2635, Internal: (81) 32635