Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp168778pxf; Wed, 17 Mar 2021 18:57:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwESRDl/PkhKy4uLlyhH0Gmt9AT5oe80I8MGZKXuZF7OkLY2G+x10931SNUTHINdCDudCmM X-Received: by 2002:a17:906:a51:: with SMTP id x17mr38865261ejf.25.1616032673453; Wed, 17 Mar 2021 18:57:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616032673; cv=none; d=google.com; s=arc-20160816; b=zdW9d4kojFpfpa0qtb5UxYUuyPKRtDWYuJ5coI0fL8BzJ8bAD2EUWAeUJb6zH+gp8Q mr1WC6Vkja8h3nEalIclymY1DnLcEQ1F3XSbDSFv7OtWBnCyDwRDrMWr0qNwr6g2bUyw APqi1C/5dUBbvi+q8UDDqfTfnkSfR+I+vmN8nj7rH7dMLZ6YZDtCr9CHJ0DxGeogS/wr 7CI6r3/vNwdxWgsN/lwcJIQmQDDMD/QhS6wqyMvOL41aOT00a3QcPPjv3TERuGS2e3++ mNpAkX+b91lktSmiya6W/kI4z58X/z6nRldzT05uTp9vfSmfhX2jDlFsrzxDQkbOlgUw JvYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=UwcUbeiAqyJW9drs1MbXvY8yN0WA+qT+vjjMYcbqI5U=; b=aX7k2dkTE1XlIpf5PYZyWi9v5OtwRBPYpGP5eCfnXd06JWq/krcEKTsHu7qm0amzBK yirx4DGnj1c/4gbwcqKg92d5nEnmV5eINFYqaj09aQ+nleKFTvPbrJyGXrWRmd7RwCV7 6+QxsAyOXdZ8hBAQ3duvMDC/IbwjnfG79kfE2wRJK9k1my53QLYAiQXIrpy7geR4uN5s FN4IEzVr80Nk1edFIdfayqMvyTSw7MAfPBuXhpk5kv0ng2QXF4pElSXIH05I9mVORwoQ JESkegZc5OpnaiDslmXVlriZfDnYiAF9DXNSUoUxGnh6Q7EsFWZ9FpUNDEgnwYZJr3YI wd8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=e5O1Uy9z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id rl3si535100ejb.86.2021.03.17.18.57.31; Wed, 17 Mar 2021 18:57:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=e5O1Uy9z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231134AbhCRBvl (ORCPT + 99 others); Wed, 17 Mar 2021 21:51:41 -0400 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:51865 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229994AbhCRBve (ORCPT ); Wed, 17 Mar 2021 21:51:34 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1616032294; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=UwcUbeiAqyJW9drs1MbXvY8yN0WA+qT+vjjMYcbqI5U=; b=e5O1Uy9z8bd7xzfE0YfjXWptBbD47/ySvCKgWq41rpwaFBIx05uzmQVVFzSbgPKir2AgaU JGo2pQ15Pauv25f/tlvM3HPZvpDAvln+AWAdFvn35pKeqKftjT0wpuiOKR115V6sVasJcp AuS2lcy+66ZUl3ntKM/IBlQDK6U/0Oc= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-456-EAY2haXQMRymrkOIBJj0aw-1; Wed, 17 Mar 2021 21:51:30 -0400 X-MC-Unique: EAY2haXQMRymrkOIBJj0aw-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 0713519251C5; Thu, 18 Mar 2021 01:51:18 +0000 (UTC) Received: from madcap2.tricolour.ca (unknown [10.10.110.12]) by smtp.corp.redhat.com (Postfix) with ESMTP id 5CA10610F1; Thu, 18 Mar 2021 01:51:15 +0000 (UTC) From: Richard Guy Briggs To: Linux-Audit Mailing List , LKML Cc: Eric Paris , Paul Moore , Richard Guy Briggs Subject: [PATCH v2 1/2] audit: document /proc/PID/loginuid Date: Wed, 17 Mar 2021 21:50:49 -0400 Message-Id: In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Describe the /proc/PID/loginuid interface in Documentation/ABI/stable that was added 2005-02-01 by commit 1e2d1492e178 ("[PATCH] audit: handle loginuid through proc") Signed-off-by: Richard Guy Briggs --- Documentation/ABI/stable/procfs-audit_loginuid | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 Documentation/ABI/stable/procfs-audit_loginuid diff --git a/Documentation/ABI/stable/procfs-audit_loginuid b/Documentation/ABI/stable/procfs-audit_loginuid new file mode 100644 index 000000000000..013bc1d74854 --- /dev/null +++ b/Documentation/ABI/stable/procfs-audit_loginuid @@ -0,0 +1,15 @@ +What: Audit Login UID +Date: 2005-02-01 +KernelVersion: 2.6.11-rc2 1e2d1492e178 ("[PATCH] audit: handle loginuid through proc") +Contact: linux-audit@redhat.com +Format: %u (u32) +Users: auditd, libaudit, audit-testsuite, login +Description: + The /proc/$pid/loginuid pseudofile is written to set and + read to get the audit login UID of process $pid. If it is + unset, permissions are not needed to set it. The accessor must + have CAP_AUDIT_CONTROL in the initial user namespace to write + it if it has been set. It cannot be written again if + AUDIT_FEATURE_LOGINUID_IMMUTABLE is enabled. It cannot be + unset if AUDIT_FEATURE_ONLY_UNSET_LOGINUID is enabled. + -- 2.27.0