Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1400280imm; Wed, 25 Jul 2018 17:55:45 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcDWGeDwJorAqJfWu2COd6b+sfFjQ7qK91DZYBiMYNpjrVKdq4cRX4OTbtUrKh3Qgj4VL4u X-Received: by 2002:a65:4c41:: with SMTP id l1-v6mr22906251pgr.310.1532566545236; Wed, 25 Jul 2018 17:55:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532566545; cv=none; d=google.com; s=arc-20160816; b=xuZVGgDt2foDkccb6zaeHsJueZM+vQXqirhDbYo7ZRrmm3OUI9j7VJcXVYDlG4ZqOm +4IPobQNHZkw9YCWofAOxSbSQJrNg3t3yO6WIJB8WRhdoyq6SYmgD09KTNc71RmLqoQw OqaNwVJcAkCWynZjVmxCAHORbgEg+BP93kPL2338J+J0ThunusRFGWpAjHd6oLkS7IhW dBPE0GZ+cWh4Rkks6DpbNkIdWrm6pzlFyAxuAfwUN/wYGGnt1/FQ+RGIdii/kWR9Ek6E RcW/+fxbhvOSUHlA6W7kLmRblMBNsPe1nnwwNNlbbHkmbDktR+L3+z/s/FEo7DyY9nzz 2uDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=wtviAZx5Ddr/lCiICt0jyAv2QYmZ3nOxFuLx3hybgPQ=; b=pMIGoARhlRVBT3X2IbC+gxDqM6X6GUrOC6SeYXuZH1PzHbYO2FgUnN0vyGJzfnwTNi NLAkF/oMRPq/mYKy0HIIy8OGKBDsFs4/R67KGrnmw8qivhy/s6Ugd1Y55MF0ht0h9j+G u9MVB2V13dKmDbhC7OrAUKrDXCWRzL5AfYkFnrvUzGozaF6kmLniugFl3+2wHHVd3jYR QaZymREyrx1Xr3h9XqYCXwIJzn9xTlMU99oAsEsbqXKrstZ43T+XpdPgrIXEUho8PVcn yweb7jdLafwCH/ZEGC/YG89hsO1g0RY0ebJo8cffEEhzE/UiLe4t3bVb5onUc94DtvQf JdXw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z13-v6si15754686pgc.409.2018.07.25.17.55.30; Wed, 25 Jul 2018 17:55:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728590AbeGZCIw (ORCPT + 99 others); Wed, 25 Jul 2018 22:08:52 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:49044 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728378AbeGZCIw (ORCPT ); Wed, 25 Jul 2018 22:08:52 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id EDC4387A76; Thu, 26 Jul 2018 00:54:35 +0000 (UTC) Received: from madcap2.tricolour.ca (ovpn-112-17.rdu2.redhat.com [10.10.112.17]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 560A11C59C; Thu, 26 Jul 2018 00:54:25 +0000 (UTC) Date: Wed, 25 Jul 2018 20:51:29 -0400 From: Richard Guy Briggs To: Paul Moore Cc: sgrubb@redhat.com, cgroups@vger.kernel.org, containers@lists.linux-foundation.org, linux-api@vger.kernel.org, linux-audit@redhat.com, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, ebiederm@xmission.com, luto@kernel.org, carlos@redhat.com, dhowells@redhat.com, viro@zeniv.linux.org.uk, simo@redhat.com, Eric Paris , serge@hallyn.com Subject: Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls Message-ID: <20180726005129.vlwgj6bgnn2hufld@madcap2.tricolour.ca> References: <3318670.y8SpQ3RC2W@x2> <20180723151148.hyu4jqy2etp5afpt@madcap2.tricolour.ca> <2739536.aL1iVigTi9@x2> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20180512 X-Scanned-By: MIMEDefang 2.79 on 10.11.54.5 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Thu, 26 Jul 2018 00:54:36 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Thu, 26 Jul 2018 00:54:36 +0000 (UTC) for IP:'10.11.54.5' DOMAIN:'int-mx05.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'rgb@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018-07-23 14:31, Paul Moore wrote: > On Mon, Jul 23, 2018 at 12:48 PM Steve Grubb wrote: > > On Monday, July 23, 2018 11:11:48 AM EDT Richard Guy Briggs wrote: > > > On 2018-07-23 09:19, Steve Grubb wrote: > > > > On Sunday, July 22, 2018 4:55:10 PM EDT Richard Guy Briggs wrote: > > > > > On 2018-07-22 09:32, Steve Grubb wrote: > > > > > > On Saturday, July 21, 2018 4:29:30 PM EDT Richard Guy Briggs wrote: > > > > > > > > > + * audit_log_contid - report container info > > > > > > > > > + * @tsk: task to be recorded > > > > > > > > > + * @context: task or local context for record > > > > > > > > > + * @op: contid string description > > > > > > > > > + */ > > > > > > > > > +int audit_log_contid(struct task_struct *tsk, > > > > > > > > > + struct audit_context *context, > > > > > > > > > char > > > > > > > > > *op) > > > > > > > > > +{ > > > > > > > > > + struct audit_buffer *ab; > > > > > > > > > + > > > > > > > > > + if (!audit_contid_set(tsk)) > > > > > > > > > + return 0; > > > > > > > > > + /* Generate AUDIT_CONTAINER record with container ID */ > > > > > > > > > + ab = audit_log_start(context, GFP_KERNEL, > > > > > > > > > AUDIT_CONTAINER); > > > > > > > > > + if (!ab) > > > > > > > > > + return -ENOMEM; > > > > > > > > > + audit_log_format(ab, "op=%s contid=%llu", > > > > > > > > > + op, audit_get_contid(tsk)); > > > > > > > > > > > > > > > > Can you explain your reason for including an "op" field in this > > > > > > > > record > > > > > > > > type? I've been looking at the rest of the patches in this > > > > > > > > patchset > > > > > > > > and it seems to be used more as an indicator of the record's > > > > > > > > generating context rather than any sort of audit container ID > > > > > > > > operation. > > > > > > > > > > > > > > "action" might work, but that's netfilter and numeric... "kind"? > > > > > > > Nothing else really seems to fit from a field name, type or lack of > > > > > > > searchability perspective. > > > > > > > > > > > > > > Steve, do you have an opinion? > > > > > > > > > > > > We only have 1 sample event where we have op=task. What are the other > > > > > > possible values? > > > > > > > > > > For the AUDIT_CONTAINER record we have op= "task", "target" (from the > > > > > ptrace and signals patch), "tty". > > > > > > > > > > For the AUDIT_CONTAINER_ID record we have "op=set". > > > > > > > > Since the purpose of this record is to log the container id, I think that > > > > is all that is needed. We can get the context from the other records in > > > > the event. I'd suggest dropping the "op" field. > > > > > > Ok, the information above it for two different audit container > > > identifier records. Which one should drop the "op=" field? Both? Or > > > just the AUDIT_CONTAINER record? The AUDIT_CONTAINER_ID record (which > > > might be renamed) could use it to distinguish a "set" record from a > > > dropped audit container identifier that is no longer registered by any > > > task or namespace. > > > > Neither of them need it. All they need to do is state the container that is > > being acted upon. > > I think we should keep the "op" field for audit container ID > management operations, even though we really only have a "set" > operation at the moment, but the others should drop the "op" field > (see my previous emails in this thread). In fact, I'd like to question the wisdom of dropping this field and perhaps fine a better or new name for it, since these contid records could be multiple and different from the primary task that is generating this record. In particular, there are extra contid records generated by the ptrace/signals patch that could be from other processes in other containers that I mentioned in a branch thread that got dropped including the auc_pids data and the target_pid also attached to the primary task's audit context. > paul moore > www.paul-moore.com - RGB -- Richard Guy Briggs Sr. S/W Engineer, Kernel Security, Base Operating Systems Remote, Ottawa, Red Hat Canada IRC: rgb, SunRaycer Voice: +1.647.777.2635, Internal: (81) 32635