Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1514279pxf; Fri, 12 Mar 2021 11:18:09 -0800 (PST) X-Google-Smtp-Source: ABdhPJx6by4okyfm8w+QCyLdKHV2i+7dQqnn3q8rKKPgnnPdUlhI3SftZCDadx9wkZGkeO+Rs+mM X-Received: by 2002:a17:906:23e9:: with SMTP id j9mr9988105ejg.78.1615576688908; Fri, 12 Mar 2021 11:18:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615576688; cv=none; d=google.com; s=arc-20160816; b=RFnhCOFXnSZnvCZcbyZp55vcNK2W7NUrrMrZl8nGewE2RXzqpymiqQW1URh2Yof19r y6kTSYRIMqHHSuEKJIQBHZl3DhrE9zPxhF66TFueD+xiYspQ1ob/MPi1JQe/vcEmx1Xc QSQ+6nQAL/Vt4lcvYDObxuj3at/19c7yiid8AFDRebbPYJ9v6s33MkRJQPhq/OzfR+3b hPBGCP4bx2xvd2J7NRsEJ24S4q3iEbBLRaF05WcPFRYhgGVHrt75KM56O4iHiuIXEZDp 7nGxPdYb3yDPKpGM4nu16qO43IGETBhmHBGa7+GPelfZnDdrzqAuMbW4/65SDGXnumNY Z80w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=xJfM+I5HqJFFYJ65C4XP9E9lkasVMia7svQJuRMmO9U=; b=jLOEZJChUoljvJjxZKhYsFxteDOv0eUwPelf2Ee/XkMlbUKGO5Ikfeli82oUO5H8DC b2T6HFaWrZtVVIY6e6IRKTFMRA+KojT77jxGbDgPxz6lLW/+wGLfzCnGW3JUmwFTnTDO So9IOi6A0aFMnuMQ7pmS2lxpWOeX21MhaZL0A4zpwLCQvYXQpuVbIQSXqw1g5gxoLsHs vgF4zmLEKqli9uUOOHyR4K/Vnu5Laq6lLDVxTKdFXy6oY9bIbJKKq1C/T46EwJHEAwjb V2AfMBb5hF2auu2n5tYLVFEWASvJp4GUsT9PWQo/VALtVSNRLYU1cc2JG26M0F+bZ0Bh IC6w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=N5N5eVLG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r6si4745502eda.292.2021.03.12.11.17.45; Fri, 12 Mar 2021 11:18:08 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=N5N5eVLG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234253AbhCLTQI (ORCPT + 99 others); Fri, 12 Mar 2021 14:16:08 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36550 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234105AbhCLTPl (ORCPT ); Fri, 12 Mar 2021 14:15:41 -0500 Received: from mail-ej1-x62a.google.com (mail-ej1-x62a.google.com [IPv6:2a00:1450:4864:20::62a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 52AEFC061574 for ; Fri, 12 Mar 2021 11:15:41 -0800 (PST) Received: by mail-ej1-x62a.google.com with SMTP id k16so1872015ejx.1 for ; Fri, 12 Mar 2021 11:15:41 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=xJfM+I5HqJFFYJ65C4XP9E9lkasVMia7svQJuRMmO9U=; b=N5N5eVLGku4zyQQF0pypZhXjcTD78uOnSIXvAk1ZwCEOMJRObNrh6B5N6Jk0IiY/FO KDEn6ZT5oGHh75BmEelkREgigLyXkyzmDsS9e5YCGsgoIMxZQm+vVmr9Nn0rM+/C5e2N u0QjYO83Mg2fmvA1mGR249GHMS3AA4HmeF9milDkPDl7agn+xb867CWIn8bLaKg1LuEX aDErq28lD6sAs6vzbr30h0BC/qd+kAZk8v3slKuqwRpUx0h8ZFe6wDvo+yURq8BoZa9r vSav2QCSxrpoHkzEVXiWEfyWTwdCKihIQqol7702P9Ai11d/FYogxhIWD4Fi9VBNIv2d elOg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=xJfM+I5HqJFFYJ65C4XP9E9lkasVMia7svQJuRMmO9U=; b=opPO5u+AILXv/0OdCNYlkBJDPz0mBjiMxM23khKU/6WTflY3qhiS+wGbIcTiSIz+6q iCNU6u+GlilWZQRrTgCaW/mJ5y7tamolHBWA+z+CmWf0hq4y61oJkRY8zDWDPZMnSrBK ry/CS7kjH/ql7cffQ3+FhQUeYGlVlceOvSYOjWYAyyV8q5a6CLUjMHXa0Yl2esZHe9mj YpbbGL408mfrALiXALlWc49tLM8wL1Qx3FYoo7SWT8idmHpS/Q/TzlY4PYy23VWzSCgq 1oAD8eXV8TRBTFrQpVLXzvHQbT114lzmtV/xOQN56hF5UKWP/HLtghAa3Q5hj9L2pYqn SgqA== X-Gm-Message-State: AOAM5317P9S7cDbs7XEH5dwr71Kz4UE4ai8ZotSq0ofKmVRAnEnSQaGe /glKK0zs/BqJ9J4AdfD0o2+xPef1Yby3nvln5sXU X-Received: by 2002:a17:906:e116:: with SMTP id gj22mr10028144ejb.398.1615576539704; Fri, 12 Mar 2021 11:15:39 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Paul Moore Date: Fri, 12 Mar 2021 14:15:28 -0500 Message-ID: Subject: Re: [PATCH 1/2] audit: document /proc/PID/loginuid To: Richard Guy Briggs Cc: Linux-Audit Mailing List , LKML , Eric Paris Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Mar 11, 2021 at 11:41 AM Richard Guy Briggs wrote: > Describe the /proc/PID/loginuid interface in Documentation/ABI/stable that > was added 2005-02-01 by commit 1e2d1492e178 ("[PATCH] audit: handle > loginuid through proc") > > Signed-off-by: Richard Guy Briggs > --- > Documentation/ABI/stable/procfs-audit_loginuid | 15 +++++++++++++++ > 1 file changed, 15 insertions(+) > create mode 100644 Documentation/ABI/stable/procfs-audit_loginuid After ~15 years, it might be time ;) > diff --git a/Documentation/ABI/stable/procfs-audit_loginuid b/Documentation/ABI/stable/procfs-audit_loginuid > new file mode 100664 > index 000000000000..fae63bef2970 > --- /dev/null > +++ b/Documentation/ABI/stable/procfs-audit_loginuid > @@ -0,0 +1,15 @@ > +What: Audit Login UID > +Date: 2005-02-01 > +KernelVersion: 2.6.11-rc2 1e2d1492e178 ("[PATCH] audit: handle loginuid through proc") > +Contact: linux-audit@redhat.com > +Format: u32 I haven't applied the patch, but I'm going to assume that the "u32" lines up correctly with the rest of the entries, right? > +Users: auditd, libaudit, audit-testsuite, login I think these entries are a bit too specific as I expect the kernel to outlive most userspace libraries and applications. I would suggest "audit and login applications" or something similar. > +Description: > + The /proc/$pid/loginuid pseudofile is written to set and I'm really in no position to critique someone's English grammar, but if we're talking about changes I might add a comma after "set", "... is written to set, and read to get ...". > + read to get the audit login UID of process $pid. If it is > + unset, permissions are not needed to set it. The accessor must > + have CAP_AUDIT_CONTROL in the initial user namespace to write > + it if it has been set. It cannot be written again if > + AUDIT_FEATURE_LOGINUID_IMMUTABLE is enabled. It cannot be > + unset if AUDIT_FEATURE_ONLY_UNSET_LOGINUID is enabled. -- paul moore www.paul-moore.com