On 8/13/20 5:05 PM, Casey Schaufler wrote:
On 8/13/2020 7:48 AM, Thiébaud Weksteen wrote:Ok, it seems to mostly against having this performance options.
From: Peter Enderborg <peter.enderborg@xxxxxxxx>It may not be my place to ask, but *please please please* don't
This patch adds further attributes to the event. These attributes are
helpful to understand the context of the message and can be used
to filter the events.
There are three common items. Source context, target context and tclass.
There are also items from the outcome of operation performed.
An event is similar to:
<...>-1309 [002] .... 6346.691689: selinux_audited:
requested=0x4000000 denied=0x4000000 audited=0x4000000
result=-13 ssid=315 tsid=61
externalize secids. I understand that it's easier to type "42"
than "system_r:cupsd_t:s0-s0:c0.c1023", and that it's easier for
your tools to parse and store the number. Once you start training
people that system_r:cupsd_t:s0-s0:c0.c1023 is secid 42 you'll
never be able to change it. The secid will start showing up in
scripts. Bad Things Will Happen.
Yes, it is a kernel internal data. So is most of the kernel tracing.
I see it is a primary tool for kernel debugging but than can also be
used for user-space debugging tools. Hiding data for debuggers
does not make any sense too me.