Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp4660902imm; Fri, 18 May 2018 08:39:09 -0700 (PDT) X-Google-Smtp-Source: AB8JxZreugck1LtqT0bLBWIY48oWGVsXvjm+uhYrzqGLD5baFs17wJbegI7uj2RHLMlpXCVtmVxl X-Received: by 2002:a17:902:8c83:: with SMTP id t3-v6mr10076201plo.357.1526657949513; Fri, 18 May 2018 08:39:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526657949; cv=none; d=google.com; s=arc-20160816; b=up0I9KHB5YJTVIwzqnbPR6MuLkL9FHBcSFMninkX840N8YI/gpvnE5/m3XTMahmHED QrzJ3DeQqmPaSi807HsgJnATBertjfrqdfGjvAQ+kKNp9FlC6pBgSmJcKKAGTbrgUnw1 BXLQQFhzNUaRNGR/SjrDa+ov2SDMW3gLxnSWayU4LIMJOeLBxkSHnIQCvRJ1LhRYehJt uXcCsKBx6/YZ+q5/BD35RtJKgvrkr+IMlXZk/Nc8Yo2JWqfdigJlstiL/lQ4J1wANyF5 JsY6HzGzE8ldV5alN2wJmjuZUXA9k/UF+JiZfZ8NNLSQh0SGD9XnOreFt2eM07wsMT1r uL3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=CV8eYpFp5APuwc34UdPLOyhbX7M01aT7BWPXx+O3ZHM=; b=hUzYhC6G76f9YCaQIMPPP4RfRq9sJvbTtDTNtZ1xsPXUouoaAElexvK2yR6zvjWaVx jxzbvdpP2LZv+JM8vPgbwCC+SaISihhvUxwGTbz5YWa6Y7CUWmlAEpujZEHaIDgrjlmI i09gDkzA4TBv88BIB7Cfuza8PAnjfyQ2M48sA1pcsmZzAGOt48SVWUEcSRi4G+afSJeb b9ZGIUgvVV9KznvXv856wJVxMSZjKxFeOC3YrqKQawHH7DzWME3TvQMdHSTh/g6UJfsn Ibtl5TISaneTELPXjKewrBmgPOBLpGGisFENHVrlx6ohyQ/DeqtF39eC+qV4OQ/LOqg0 2row== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a66-v6si8136068pfb.81.2018.05.18.08.38.54; Fri, 18 May 2018 08:39:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752297AbeERPi2 (ORCPT + 99 others); Fri, 18 May 2018 11:38:28 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:33980 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751112AbeERPi0 (ORCPT ); Fri, 18 May 2018 11:38:26 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 391E581663D2; Fri, 18 May 2018 15:38:25 +0000 (UTC) Received: from ivy-bridge (ovpn-126-100.rdu2.redhat.com [10.10.126.100]) by smtp.corp.redhat.com (Postfix) with ESMTP id 09B2F2026E03; Fri, 18 May 2018 15:38:23 +0000 (UTC) Date: Fri, 18 May 2018 11:38:25 -0400 From: Steve Grubb To: Richard Guy Briggs Cc: cgroups@vger.kernel.org, containers@lists.linux-foundation.org, linux-api@vger.kernel.org, Linux-Audit Mailing List , linux-fsdevel@vger.kernel.org, LKML , netdev@vger.kernel.org, ebiederm@xmission.com, luto@kernel.org, jlayton@redhat.com, carlos@redhat.com, dhowells@redhat.com, viro@zeniv.linux.org.uk, simo@redhat.com, eparis@parisplace.org, serge@hallyn.com Subject: Re: [RFC PATCH ghak32 V2 01/13] audit: add container id Message-ID: <20180518113825.4ceeadf6@ivy-bridge> In-Reply-To: <20180518152106.do5b3mu6e6eyvo7q@madcap2.tricolour.ca> References: <20180517170053.7d4afa87@ivy-bridge> <20180517215600.dyswlkvqdtgjwr5y@madcap2.tricolour.ca> <20180518095636.56ff322d@ivy-bridge> <20180518152106.do5b3mu6e6eyvo7q@madcap2.tricolour.ca> Organization: Red Hat MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Fri, 18 May 2018 15:38:25 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Fri, 18 May 2018 15:38:25 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'sgrubb@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 18 May 2018 11:21:06 -0400 Richard Guy Briggs wrote: > On 2018-05-18 09:56, Steve Grubb wrote: > > On Thu, 17 May 2018 17:56:00 -0400 > > Richard Guy Briggs wrote: > > > > > > During syscall events, the path info is returned in a a record > > > > simply called AUDIT_PATH, cwd info is returned in AUDIT_CWD. So, > > > > rather than calling the record that gets attached to everything > > > > AUDIT_CONTAINER_INFO, how about simply AUDIT_CONTAINER. > > > > > > Considering the container initiation record is different than the > > > record to document the container involved in an otherwise normal > > > syscall, we need two names. I don't have a strong opinion what > > > they are. > > > > > > I'd prefer AUDIT_CONTAIN and AUDIT_CONTAINER_INFO so that the two > > > are different enough to be visually distinct while leaving > > > AUDIT_CONTAINERID for the field type in patch 4 ("audit: add > > > containerid filtering") > > (Sorry, I had intended AUDIT_CONTAINER for the first in that paragraph > above.) > > > How about AUDIT_CONTAINER for the auxiliary record? The one that > > starts the container, I don't have a strong opinion on. Could be > > AUDIT_CONTAINER_INIT, AUDIT_CONTAINER_START, AUDIT_CONTAINERID, > > AUDIT_CONTAINER_ID, or something else. The API call that sets the ID > > for filtering could be AUDIT_CID or AUDIT_CONTID if that helps > > decide what the initial event might be. Normally, it should match > > the field being filtered. > > Ok, I had shortened the record field name to "contid=" to be unique > enough while not using too much netlink bandwidth. I could have used > "cid=" but that could be unobvious or ambiguous. I didn't want to use > the full "containerid=" due to that. I suppose I could change the > field name macro to AUDIT_CONTID. > > For the one that starts the container, I'd prefer to leave the name a > bit more general than "_INIT", "_START", so maybe I'll swap them > around and use AUDIT_CONTAINER_INFO for the startup record, and use > AUDIT_CONTAINER for the syscall auxiliary record. > > Does that work? I'll go along with that. Thanks. But making that swap frees up AUDIT_CONTAINER_ID which could be the first event. But AUDIT_CONTAINER_INFO is also fine with me. Best Regards, -Steve