Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp675536imm; Mon, 21 May 2018 12:20:28 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqY09s9T088KyYo2uvPX2wqx9IEqruzFUGB2CTyruiZG24PiNTmJi+Bnrpu6gK75j5skXyB X-Received: by 2002:a17:902:bf4a:: with SMTP id u10-v6mr22055238pls.322.1526930428822; Mon, 21 May 2018 12:20:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526930428; cv=none; d=google.com; s=arc-20160816; b=QInz0HbmxbCfuSzTDhtQxbVm8w29jjdsE4p38aCoQl3x7hKZIyo3i03VWAoKOIhXBT UFWvt36c1tVHTcjXBEV85138mhqsQ9ZgVh2WjDgz9dNXb5iq11jHb9mJ6L4lxVF7TN4V nWSbnNNTNMAbKGhr1zElQbz7WI+AbjFKH2sI7ktxQdLRPAPdj41v48WI1AX7GCk9RNLW cLa5R+qqIGSx4aWeqKg88zaKZgAaFWmjBDjaLP/MWOK6QMgf1E8HMsM/KfTyfTOs2uoL K/ROYJzORBH65uLXaR6VwVdnE26ESyquiKXSx6pvfvQvb1256OEo49AGNLeCgUhN4wY7 CwxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:subject:mime-version:user-agent :message-id:in-reply-to:date:references:cc:to:from :arc-authentication-results; bh=h9ONc7lqCnNSBDzFopCk8RQu/QaMuW+0GZfQz5CUxi0=; b=qsCc9RqQ23vYACMCJnsMME+shYiUhGHCTFne6qfueNWrk7WOjCw8oUz9DljvPRHFpi M7AkLlZVtOHDmjmbWrWGLAxOAU7yx1M56s5dtBGjIRY8vxMy3dRhjY6r06npThqi3dxd CxyUEXnNNwFSd/KkkNTjVImMnUUZo3HtpZFFtw8nGIcSoWkNUMWVPDboAJxtQG+XuW0D t7mLOtpc+5+4iv7qb88QhCR3lCAhXd3poZr9QrWKc2uAzqc4iz6HUNGcx3WDFyRXGHk3 nU+RKGh8QUN+gfkfhICoptpG5Fsz43uQ2xhglVXLY2i3ZvIBwCSkq60GJWR9oPhp01/6 l2SQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3-v6si11122799plq.56.2018.05.21.12.20.13; Mon, 21 May 2018 12:20:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751368AbeEUTTu (ORCPT + 99 others); Mon, 21 May 2018 15:19:50 -0400 Received: from out03.mta.xmission.com ([166.70.13.233]:47228 "EHLO out03.mta.xmission.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751101AbeEUTTr (ORCPT ); Mon, 21 May 2018 15:19:47 -0400 Received: from in02.mta.xmission.com ([166.70.13.52]) by out03.mta.xmission.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.87) (envelope-from ) id 1fKqLR-0005OO-KJ; Mon, 21 May 2018 13:19:45 -0600 Received: from [97.119.174.25] (helo=x220.xmission.com) by in02.mta.xmission.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.87) (envelope-from ) id 1fKqLC-0003Oi-9V; Mon, 21 May 2018 13:19:45 -0600 From: ebiederm@xmission.com (Eric W. Biederman) To: Steve Grubb Cc: linux-audit@redhat.com, Richard Guy Briggs , cgroups@vger.kernel.org, containers@lists.linux-foundation.org, linux-api@vger.kernel.org, linux-fsdevel@vger.kernel.org, LKML , netdev@vger.kernel.org, luto@kernel.org, jlayton@redhat.com, carlos@redhat.com, dhowells@redhat.com, viro@zeniv.linux.org.uk, simo@redhat.com, eparis@parisplace.org, serge@hallyn.com References: <1081821010c124fe4e35984ec3dac1654453bb7c.1521179281.git.rgb@redhat.com> <3001737.MkQ41rgtZF@x2> Date: Mon, 21 May 2018 14:19:24 -0500 In-Reply-To: <3001737.MkQ41rgtZF@x2> (Steve Grubb's message of "Mon, 21 May 2018 15:16:01 -0400") Message-ID: <87muwshl4z.fsf@xmission.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-XM-SPF: eid=1fKqLC-0003Oi-9V;;;mid=<87muwshl4z.fsf@xmission.com>;;;hst=in02.mta.xmission.com;;;ip=97.119.174.25;;;frm=ebiederm@xmission.com;;;spf=neutral X-XM-AID: U2FsdGVkX19Ug9mvPeJwcGcF/9q4Oo/nCE9BVq7lacQ= X-SA-Exim-Connect-IP: 97.119.174.25 X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on sa07.xmission.com X-Spam-Level: X-Spam-Status: No, score=0.5 required=8.0 tests=ALL_TRUSTED,BAYES_50, DCC_CHECK_NEGATIVE,T_TM2_M_HEADER_IN_MSG,XMSubLong autolearn=disabled version=3.4.1 X-Spam-Report: * -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP * 0.7 XMSubLong Long Subject * 0.0 T_TM2_M_HEADER_IN_MSG BODY: No description available. * 0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60% * [score: 0.5000] * -0.0 DCC_CHECK_NEGATIVE Not listed in DCC * [sa07 1397; Body=1 Fuz1=1 Fuz2=1] X-Spam-DCC: XMission; sa07 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: ;Steve Grubb X-Spam-Relay-Country: X-Spam-Timing: total 15022 ms - load_scoreonly_sql: 0.06 (0.0%), signal_user_changed: 2.8 (0.0%), b_tie_ro: 1.88 (0.0%), parse: 0.89 (0.0%), extract_message_metadata: 10 (0.1%), get_uri_detail_list: 0.77 (0.0%), tests_pri_-1000: 3.6 (0.0%), tests_pri_-950: 1.38 (0.0%), tests_pri_-900: 1.22 (0.0%), tests_pri_-400: 18 (0.1%), check_bayes: 17 (0.1%), b_tokenize: 6 (0.0%), b_tok_get_all: 6 (0.0%), b_comp_prob: 1.91 (0.0%), b_tok_touch_all: 2.4 (0.0%), b_finish: 0.61 (0.0%), tests_pri_0: 147 (1.0%), check_dkim_signature: 0.63 (0.0%), check_dkim_adsp: 3.2 (0.0%), tests_pri_500: 14833 (98.7%), poll_dns_idle: 14824 (98.7%), rewrite_mail: 0.00 (0.0%) Subject: Re: [RFC PATCH ghak32 V2 13/13] debug audit: read container ID of a process X-Spam-Flag: No X-SA-Exim-Version: 4.2.1 (built Thu, 05 May 2016 13:38:54 -0600) X-SA-Exim-Scanned: Yes (on in02.mta.xmission.com) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Steve Grubb writes: > On Friday, March 16, 2018 5:00:40 AM EDT Richard Guy Briggs wrote: >> Add support for reading the container ID from the proc filesystem. > > I think this could be useful in general. Please consider this to be part of > the full patch set and not something merely used to debug the patches. Only with an audit specific name. As it is: Nacked-by: "Eric W. Biederman" The truth is the containerid name really stinks and is quite confusing and does not imply that the label applies only to audit. And little things like this make me extremely uncofortable with it. Eric