Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp4299859pxu; Mon, 21 Dec 2020 09:00:10 -0800 (PST) X-Google-Smtp-Source: ABdhPJzwWQ4EyV7N3vmcP2oNNjWJ2mL5vAXgKsbzXdLrfeqXVANYTONA73gIZ8KsZnFDujQqsFD8 X-Received: by 2002:a17:906:254b:: with SMTP id j11mr16186804ejb.326.1608570009825; Mon, 21 Dec 2020 09:00:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1608570009; cv=none; d=google.com; s=arc-20160816; b=auAyZXWl+OCYEZ1fv6WCGnrQ3hrbmXzz6MIFcfVp/7o5qiEYsXmw7V733Q7uYpqMvD m6kPa7tQcahJYQuts9lvrkNEvMo5qBMe9jTylskrdYGHwgypvou5YilaOJFrmv2DsV+n 3Z2sHO1ZPMZuvTpgRHUsg1AbgSQ2SJRTYbontTNdq5X6vqC14JhSCrC8rgR3muBY/PiB MGFpcUppslyPL90RYkoNqwyjeC9uYiaYqZwKNHoHDq7NbONvGPP+JEEwJvp90KHdRmOs wT5Tg+y77NzcPB+9CChQ5o3UpgrrH4a1kbIOupLhvF8cL0x7vMASWnePomfaWge0PRUc EIKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from :dkim-signature; bh=K4+cQynOaPWMM6UVfebDrf8g6JKTvCGf7Xx1gFDGVrA=; b=WTkj8vfjLjuii6NliI4J8QRZQ94G2680Oy9ahQyD95GG9dHQuaDpvsjfUfUcGWUKLv C4jtsunZnPRXG0V3K5bR0jziEzVAxcrp5zeD6l7KpofzJbm9ddbdn7+WwnyCALcZeE8Y m37YG/znWdTpfFGz6uFmQ7iPQlGvc+vfMGQ+02YflCNrq1ftagwmNIRdG6CJpLmyjXFR YvVrXfsRkaehOfQl3LExw/5/5+5zA/ll+s1VVn6EIRocLnn0yAqGEm69/4+NpcrP+PR+ k6bWdMDBvXXqoIUDTzdfUBIeb9hcMO6a9UaAbnMblJOnStMo/ZdckRkp2VQ3wL6AdpU/ d6sw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=a65dI4MP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u9si10409268edv.418.2020.12.21.08.59.47; Mon, 21 Dec 2020 09:00:09 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=a65dI4MP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725930AbgLUQ6N (ORCPT + 99 others); Mon, 21 Dec 2020 11:58:13 -0500 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:20852 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725793AbgLUQ6M (ORCPT ); Mon, 21 Dec 2020 11:58:12 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1608569803; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc; bh=K4+cQynOaPWMM6UVfebDrf8g6JKTvCGf7Xx1gFDGVrA=; b=a65dI4MPrbXAC4sNIXmJQB7zuMhBYh02mOBf3ZlpqfFPk6y3z6ekb7cL9scLAFaojObyxv D2svSFvdi6mr3w7d6nE6qglygqnROL4AI6WHqKzhImPaec+xkryvm0UZ67RnQMT5TK7Cto mIm0hYlmsjNjiS/Pj+AZa64vhhYpkgk= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-51-lkdv1rgYOR2d0dbOXuWXyQ-1; Mon, 21 Dec 2020 11:56:39 -0500 X-MC-Unique: lkdv1rgYOR2d0dbOXuWXyQ-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id EF40C190D343; Mon, 21 Dec 2020 16:56:36 +0000 (UTC) Received: from madcap2.tricolour.ca (unknown [10.10.110.9]) by smtp.corp.redhat.com (Postfix) with ESMTP id F174F60C0F; Mon, 21 Dec 2020 16:56:21 +0000 (UTC) From: Richard Guy Briggs To: Linux Containers List , Linux API , Linux-Audit Mailing List , Linux FSdevel , LKML , Linux NetDev Upstream Mailing List , Netfilter Devel List Cc: Neil Horman , David Howells , "Eric W. Biederman" , Simo Sorce , Eric Paris , mpatel@redhat.com, Serge Hallyn , Kees Cook , Jens Axboe , Christian Brauner , Richard Guy Briggs Subject: [PATCH ghak90 v10 00/11] audit: implement container identifier Date: Mon, 21 Dec 2020 11:55:34 -0500 Message-Id: X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Implement kernel audit container identifier. This patchset is an eighth based on the proposal document (V4) posted: https://www.redhat.com/archives/linux-audit/2019-September/msg00052.html The first patch was the last patch from ghak81 that was absorbed into this patchset since its primary justification is the rest of this patchset. It abstracts the audit kernel internal api to be able to better regulate audit operations. The second patch implements the proc fs write to set the audit container identifier of a process, emitting an AUDIT_CONTAINER_OP record to announce the registration of that audit container identifier on that process. The ID can be read from the same file. This patch requires userspace support for record acceptance and proper type display. The ID is stored as an object that includes owner information to check for descendancy, allow process injection into a container and prevent id reuse by other orchestrators. The same record type is emitted once all tasks using that audit container identifier have exited. The 3rd implements the auxiliary record AUDIT_CONTAINER_ID if an audit container identifier is associated with an event. This patch requires userspace support for proper type display. The 4th adds audit daemon signalling provenance through audit_sig_info2. The 5th creates a local audit context to be able to bind a standalone record with a locally created auxiliary record. The 6th patch adds audit container identifier records to the user standalone records. The 7th adds audit container identifier filtering to the exit, exclude and user lists. This patch adds the AUDIT_CONTID field and requires auditctl userspace support for the --contid option. The 8th adds network namespace audit container identifier labelling based on member tasks' audit container identifier labels which supports standalone netfilter records that don't have a task context and lists each container to which that net namespace belongs. The 9th checks that the target is a descendant for nesting and refactors to avoid a duplicate of the copied function. The 10th adds tracking and reporting for container nesting. This enables kernel filtering and userspace searches of nested audit container identifiers. The 11th adds a mechanism to allow a process to be designated as a container orchestrator/engine in non-init user namespaces. Example: Set an audit container identifier of 123456 to the "sleep" task: sleep 2& child=$! echo 123456 > /proc/$child/audit_containerid; echo $? ausearch -ts recent -i -m container_op echo child:$child contid:$( cat /proc/$child/audit_containerid) This should produce an event such as: type=PROCTITLE msg=audit(2020-11-26 11:03:36.566:174604) : proctitle=-bash type=SYSCALL msg=audit(2020-11-26 11:03:36.566:174604) : arch=x86_64 syscall=write success=no exit=ENOTUNIQ(Name not unique on network) a0=0x1 a1=0x55cf347b27c0a2=0x7 a3=0x55cf3480ded0 items=0 ppid=483 pid=507 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=ttyS0 ses=1 comm=bash exe=/usr/bin/bash subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null) type=CONTAINER_OP msg=audit(2020-11-26 11:03:36.566:174604) : op=set opid=9069 contid=123456 old-contid=unset Example: Set a filter on an audit container identifier 123459 on /tmp/tmpcontainerid: contid=123459 key=tmpcontainerid auditctl -a exit,always -F dir=/tmp -F perm=wa -F contid=$contid -F key=$key perl -e "sleep 1; open(my \$tmpfile, '>', \"/tmp/$key\"); close(\$tmpfile);" & child=$! echo $contid > /proc/$child/audit_containerid sleep 2 ausearch -i -ts recent -k $key auditctl -d exit,always -F dir=/tmp -F perm=wa -F contid=$contid -F key=$key rm -f /tmp/$key This should produce an event such as: type=CONTAINER_ID msg=audit(2020-11-26 12:46:31.707:26953) : record=1 contid=123459 type=PROCTITLE msg=audit(2020-11-26 12:46:31.707:26953) : proctitle=perl -e sleep 1; open(my $tmpfile, '>', "/tmp/tmpcontainerid"); close($tmpfile); type=PATH msg=audit(2020-11-26 12:46:31.707:26953) : item=1 name=/tmp/tmpcontainerid inode=25656 dev=00:26 mode=file,644 ouid=root ogid=root rdev=00:00 obj=unconfined_u:object_r:user_tmp_t:s0 nametype=CREATE cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 type=PATH msg=audit(2020-11-26 12:46:31.707:26953) : item=0 name=/tmp/ inode=8985 dev=00:26 mode=dir,sticky,777 ouid=root ogid=root rdev=00:00 obj=system_u:object_r:tmp_t:s0 nametype=PARENT cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 type=CWD msg=audit(2020-11-26 12:46:31.707:26953) : cwd=/root type=SYSCALL msg=audit(2020-11-26 12:46:31.707:26953) : arch=x86_64 syscall=openat success=yes exit=3 a0=0xffffffffffffff9c a1=0x5621f2b81900 a2=O_WRONLY|O_CREAT|O_TRUNC a3=0x1b6 items=2 ppid=628 pid=2232 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=ttyS0 ses=1 comm=perl exe=/usr/bin/perl subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=tmpcontainerid record=1 Example: Test multiple containers on one netns: sleep 5 & child1=$! containerid1=123451 echo $containerid1 > /proc/$child1/audit_containerid sleep 5 & child2=$! containerid2=123452 echo $containerid2 > /proc/$child2/audit_containerid iptables -I INPUT -i lo -p icmp --icmp-type echo-request -j AUDIT --type accept iptables -I INPUT -t mangle -i lo -p icmp --icmp-type echo-request -j MARK --set-mark 0x12345555 sleep 1; bash -c "ping -q -c 1 127.0.0.1 >/dev/null 2>&1" sleep 1; ausearch -i -m NETFILTER_PKT -ts boot|grep mark=0x12345555 ausearch -i -m NETFILTER_PKT -ts boot|grep contid=|grep $containerid1|grep $containerid2 This would produce an event such as: type=NETFILTER_PKT msg=audit(2020-11-26 14:16:13.369:244) : mark=0x12345555 saddr=127.0.0.1 daddr=127.0.0.1 proto=icmp record=1 type=CONTAINER_ID msg=audit(2020-11-26 14:16:13.369:244) : record=1 contid=123452,123451 Includes the last patch of https://github.com/linux-audit/audit-kernel/issues/81 Please see the github audit kernel issue for the main feature: https://github.com/linux-audit/audit-kernel/issues/90 and the kernel filter code: https://github.com/linux-audit/audit-kernel/issues/91 and the network support: https://github.com/linux-audit/audit-kernel/issues/92 Please see the github audit userspace issue for supporting record types: https://github.com/linux-audit/audit-userspace/issues/51 and filter code: https://github.com/linux-audit/audit-userspace/issues/40 Please see the github audit testsuiite issue for the test case: https://github.com/linux-audit/audit-testsuite/issues/64 https://github.com/rgbriggs/audit-testsuite/tree/ghat64-contid https://githu.com/linux-audit/audit-testsuite/pull/91 Please see the github audit wiki for the feature overview: https://github.com/linux-audit/audit-kernel/wiki/RFE-Audit-Container-ID The code is also posted at: git://toccata2.tricolour.ca/linux-2.6-rgb.git ghak90-contid.v10 Changelog: v10 - rebase on ghak124, ghak96, ghak84, actual wait, 5.9-rc1, ghak120, 5.10-rc1, io_uring - localize struct struct audit_task_info to audit.c, move related functions from proc/base.c, audit.h, auditsc.c to audit.c - add Documentation/ABI for /proc/PID/audit_*containerid - convert from rcu to spin lock around contid put and optimize other spinlock use - swap task_lock and tasklist_lock in audit_set_contid (deadlock with sys_prlimit64) - restructure audit_set_contid intro (elsif ladder) - open code audit_contid_valid and audit_contid_set - rename contobj_get to contobj_get_bytask, contobj_hold to contobj_get - squash in audit contid drop, change new contid to -1 - squash in proc audit contid read - add count param to audit_contobj_put to reduce locking, free target_cid keyed on target_pid - add record= field to CONTAINER_ID record to link to OBJ_PID, SYSCALL, NETFILTER_PKT - add helper function audit_log_container_id_ctx - rename audit_sig_atsk to audit_sig_adtsk - add missing contobj_put in audit_log_exit and of audit_sig_cid in AUDIT_SIGNAL_INFO - switch from -ESHUTDOWN to -ENOTUNIQ for as yet unreaped contid - add helper audit_contid_comparator in audit.c (part of hide) - move audit_contobj_netns to audit.c (part of hide) - fix spin_lock with irq option for network interrupt support - add missing check for audit_get_capcontid in audit_set_contid - check individual patch complilation - patch description cleanups (in_syscall vs local, contid nesting examples) - remove unnecessary audit_log_format() calls - remove unnecessary rcu locking aroung net_generic call() v9 - rebase on v5.8-rc1 - fix whitespace and oversize lines where practicable - remove harmless duplicate S_IRUSR in capcontid - return -EBUSY for both threading and children (drop -EALREADY) - return -EEXIST if already set and not nesting (drop -ECHILD) - fix unbalanced brace and remove elseif ladder - drop check for same contid set again as redundant (drop -EADDRINUSE) - get reference to contobj's parent taskstruct - protect all contid list updates with audit_contobj_list_lock - protect refcounts with rcu read lock - convert _audit_contobj to _audit_contobj_get, which calls _audit_contobj_hold - convert audit_log_container_id() and audit_log_contid() from u64 to contobj, simplifying - issue death certificate on contid after exit of last task - keep contobj ref to block reuse with -ESHUTDOWN until auditd exit or signal info - report all contids nested - rework sig_info2 format to accommodate contid list - fix zero-length array in include/linux/audit.h struct audit_sig_info2 data[] - found bug in audit_alloc_local, don't check audit_ever_enabled, since all callers check audit_enabled - remove warning at declaration of audit_sig_cid of reuse since reuse is now blocked - report descendancy checking errcodes under -EXDEV (drop -EBADSLT) - add missed check, replace audit_contid_isowner with audit_contid_isnesting - limit calls to audit_log_format() with if(iter->parent) ... - list only one contid in contid, nested in old-contid to avoid duplication - switch to comma delimiter, carrat modifier in nested contid list - special case -1 for AUDIT_CID_UNSET printing - drop contid depth limit and netns contid limit patches - enforce capcontid policy on contid write and read - squash conversion to contobj into contid intro patch v8 - rebase on v5.5-rc1 audit/next - remove subject attrs in CONTAINER_OP record - group audit_contid_list_lock with audit_contid_hash - in audit_{set,log}_contid(), break out of loop after finding target - use target var to size kmalloc - rework audit_cont_owner() to bool audit_contid_isowner() and move to where used - create static void audit_cont_hold(struct audit_contobj *cont) { refcount_inc(&cont->refcount); } - rename audit_cont{,_*} refs to audit_contobj{,_*} - prefix special local functions with _ [audit_contobj*()] - protect contid list traversals with rcu_read_lock() and updates with audit_contid_list_lock - protect real_parent in audit_contid_depth() with rcu_dereference - give new contid field nesting format in patch description - squash task_is_descendant() - squash support for NETFILTER_PKT into network namespaces - limit nesting depth based on record length overflow, bandwidth and storage - implent control for audit container identifier nesting depth limit - make room for audit_bpf patches (bump CONTAINER_ID to 1335) - squash proc interface into capcontid - remove netlink access to loginuid/sessionid/contid/capcontid - delete 32k contid limit patch - document potential overlap between signal delivery and contid reuse - document audit_contobj_list_lock coverage - document disappearing orch task injection limitation - limit the number of containers that can be associated with a network namespace - implent control for audit container identifier netns count limit v7 - remove BUG() in audit_comparator64() - rebase on v5.2-rc1 audit/next - resolve merge conflict with ghak111 (signal_info regardless syscall) - resolve merge conflict with ghak73 (audit_field_valid) - resolve merge conflict with ghak64 (saddr_fam filter) - resolve merge conflict with ghak10 (ntp audit) change AUDIT_CONTAINER_ID from 1332 to 1334 - rebase on v5.3-rc1 audit/next - track container owner - only permit setting contid of descendants for nesting - track drop of contid and permit reuse - track and report container nesting - permit filtering on any nested contid - set/get contid and loginuid/sessionid via netlink - implement capcontid to enable orchestrators in non-init user namespaces - limit number of containers - limit depth of container nesting v6 - change TMPBUFLEN from 11 to 21 to cover the decimal value of contid u64 (nhorman) - fix bug overwriting ctx in struct audit_sig_info, move cid above ctx[0] (nhorman) - fix bug skipping remaining fields and not advancing bufp when copying out contid in audit_krule_to_data (omosnacec) - add acks, tidy commit descriptions, other formatting fixes (checkpatch wrong on audit_log_lost) - cast ull for u64 prints - target_cid tracking was moved from the ptrace/signal patch to container_op - target ptrace and signal records were moved from the ptrace/signal patch to container_id - auditd signaller tracking was moved to a new AUDIT_SIGNAL_INFO2 request and record - ditch unnecessary list_empty() checks - check for null net and aunet in audit_netns_contid_add() - swap CONTAINER_OP contid/old-contid order to ease parsing v5 - address loginuid and sessionid syscall scope in ghak104 - address audit_context in CONFIG_AUDIT vs CONFIG_AUDITSYSCALL in ghak105 - remove tty patch, addressed in ghak106 - rebase on audit/next v5.0-rc1 w/ghak59/ghak104/ghak103/ghak100/ghak107/ghak105/ghak106/ghak105sup - update CONTAINER_ID to CONTAINER_OP in patch description - move audit_context in audit_task_info to CONFIG_AUDITSYSCALL - move audit_alloc() and audit_free() out of CONFIG_AUDITSYSCALL and into CONFIG_AUDIT and create audit_{alloc,free}_syscall - use plain kmem_cache_alloc() rather than kmem_cache_zalloc() in audit_alloc() - fix audit_get_contid() declaration type error - move audit_set_contid() from auditsc.c to audit.c - audit_log_contid() returns void - audit_log_contid() handed contid rather than tsk - switch from AUDIT_CONTAINER to AUDIT_CONTAINER_ID for aux record - move audit_log_contid(tsk/contid) & audit_contid_set(tsk)/audit_contid_valid(contid) - switch from tsk to current - audit_alloc_local() calls audit_log_lost() on failure to allocate a context - add AUDIT_USER* non-syscall contid record - cosmetic cleanup double parens, goto out on err - ditch audit_get_ns_contid_list_lock(), fix aunet lock race - switch from all-cpu read spinlock to rcu, keep spinlock for write - update audit_alloc_local() to use ktime_get_coarse_real_ts64() - add nft_log support - add call from do_exit() in audit_free() to remove contid from netns - relegate AUDIT_CONTAINER ref= field (was op=) to debug patch v4 - preface set with ghak81:"collect audit task parameters" - add shallyn and sgrubb acks - rename feature bitmap macro - rename cid_valid() to audit_contid_valid() - rename AUDIT_CONTAINER_ID to AUDIT_CONTAINER_OP - delete audit_get_contid_list() from headers - move work into inner if, delete "found" - change netns contid list function names - move exports for audit_log_contid audit_alloc_local audit_free_context to non-syscall patch - list contids CSV - pass in gfp flags to audit_alloc_local() (fix audit_alloc_context callers) - use "local" in lieu of abusing in_syscall for auditsc_get_stamp() - read_lock(&tasklist_lock) around children and thread check - task_lock(tsk) should be taken before first check of tsk->audit - add spin lock to contid list in aunet - restrict /proc read to CAP_AUDIT_CONTROL - remove set again prohibition and inherited flag - delete contidion spelling fix from patchset, send to netdev/linux-wireless v3 - switched from containerid in task_struct to audit_task_info (depends on ghak81) - drop INVALID_CID in favour of only AUDIT_CID_UNSET - check for !audit_task_info, throw -ENOPROTOOPT on set - changed -EPERM to -EEXIST for parent check - return AUDIT_CID_UNSET if !audit_enabled - squash child/thread check patch into AUDIT_CONTAINER_ID patch - changed -EPERM to -EBUSY for child check - separate child and thread checks, use -EALREADY for latter - move addition of op= from ptrace/signal patch to AUDIT_CONTAINER patch - fix && to || bashism in ptrace/signal patch - uninline and export function for audit_free_context() - drop CONFIG_CHANGE, FEATURE_CHANGE, ANOM_ABEND, ANOM_SECCOMP patches - move audit_enabled check (xt_AUDIT) - switched from containerid list in struct net to net_generic's struct audit_net - move containerid list iteration into audit (xt_AUDIT) - create function to move namespace switch into audit - switched /proc/PID/ entry from containerid to audit_containerid - call kzalloc with GFP_ATOMIC on in_atomic() in audit_alloc_context() - call kzalloc with GFP_ATOMIC on in_atomic() in audit_log_container_info() - use xt_net(par) instead of sock_net(skb->sk) to get net - switched record and field names: initial CONTAINER_ID, aux CONTAINER, field CONTID - allow to set own contid - open code audit_set_containerid - add contid inherited flag - ccontainerid and pcontainerid eliminated due to inherited flag - change name of container list funcitons - rename containerid to contid - convert initial container record to syscall aux - fix spelling mistake of contidion in net/rfkill/core.c to avoid contid name collision v2 - add check for children and threads - add network namespace container identifier list - add NETFILTER_PKT audit container identifier logging - patch description and documentation clean-up and example - reap unused ppid Richard Guy Briggs (11): audit: collect audit task parameters audit: add container id audit: log container info of syscalls audit: add contid support for signalling the audit daemon audit: add support for non-syscall auxiliary records audit: add containerid support for user records audit: add containerid filtering audit: add support for containerid to network namespaces audit: contid check descendancy and nesting audit: track container nesting audit: add capcontid to set contid outside init_user_ns .../ABI/testing/procfs-audit_containerid | 29 + fs/io-wq.c | 8 +- fs/io_uring.c | 16 +- fs/proc/base.c | 110 ++- include/linux/audit.h | 83 +- include/linux/sched.h | 10 +- include/uapi/linux/audit.h | 10 +- init/init_task.c | 3 +- init/main.c | 2 + kernel/audit.c | 877 +++++++++++++++++- kernel/audit.h | 19 + kernel/auditfilter.c | 46 + kernel/auditsc.c | 109 ++- kernel/fork.c | 1 - kernel/nsproxy.c | 4 + kernel/sched/core.c | 33 + net/netfilter/nft_log.c | 14 +- net/netfilter/xt_AUDIT.c | 14 +- security/selinux/nlmsgtab.c | 1 + security/yama/yama_lsm.c | 33 - 20 files changed, 1294 insertions(+), 128 deletions(-) create mode 100644 Documentation/ABI/testing/procfs-audit_containerid -- 2.18.4