From nobody Fri Dec 19 07:24:10 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of redhat.com designates 216.205.24.124 as permitted sender) client-ip=216.205.24.124; envelope-from=libvir-list-bounces@redhat.com; helo=us-smtp-delivery-124.mimecast.com; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 216.205.24.124 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1615549521; cv=none; d=zohomail.com; s=zohoarc; b=ULezgDyClpxpimm61Mi0WzcxcEvXe6D3RMR4GIM8OziW1MgTxoKzYdsrOTICgfAysMZRe0SRPMfj+ygwyTmdf3+nvPdwaQPBOJhQtKNxcldr9FX0U/ANXmiyhGQq+xswySkspXHerlcifqkf8KPtniB4oFY27yYd20jWq0ucQDA= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1615549521; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=UJCwcLlYE2R62U62eAKIyB8wlF45cXJo9yWbbHMlRrw=; b=S8YtNAIp1QE0LXL1YrGMjwoH372rvKYuDXwz0gkGkfk61TR7h/2zSG8p8mEdhtduu1YwL4gUWVIRrR5uAYg4c+a9bM2WZXzN0lkB7Oo7QFaAu9q7Jc9kKw3z98r2/JpyG7zRYUyeFzaY736ymf2IoJDFgL/RHn/xiFOBuzOWa1M= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 216.205.24.124 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com; dmarc=pass header.from= (p=none dis=none) header.from= Return-Path: Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [216.205.24.124]) by mx.zohomail.com with SMTPS id 1615549521504903.2912419395309; Fri, 12 Mar 2021 03:45:21 -0800 (PST) Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-137-7BCqr-i0NxSY51BHoMsgiQ-1; Fri, 12 Mar 2021 06:45:14 -0500 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 18FBBDF8A3; Fri, 12 Mar 2021 11:45:07 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id D1BE117D61; Fri, 12 Mar 2021 11:45:06 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 3F7E057DCB; Fri, 12 Mar 2021 11:45:06 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id 12CBhN26024890 for ; Fri, 12 Mar 2021 06:43:23 -0500 Received: by smtp.corp.redhat.com (Postfix) id 13D9F60657; Fri, 12 Mar 2021 11:43:23 +0000 (UTC) Received: from nautilus.redhat.com (unknown [10.40.192.123]) by smtp.corp.redhat.com (Postfix) with ESMTP id 6380860636; Fri, 12 Mar 2021 11:43:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1615549520; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:list-id:list-help: list-unsubscribe:list-subscribe:list-post; bh=UJCwcLlYE2R62U62eAKIyB8wlF45cXJo9yWbbHMlRrw=; b=GTL+OFEUiOyr1E8lPAqhXpJPQoWIfuWlQ8IF5yy04cddWoQis1RXhpeqKGelnsbIwegKI1 73FnP60UZkfTQIUrUM7I8JjhmDWJDmWkv0eMeHMnvfRJuQMv16sIBgf23/jzBk346gtsqs LzAQNJSOgvx86YOdxqu4CQZu3xW2AZM= X-MC-Unique: 7BCqr-i0NxSY51BHoMsgiQ-1 From: Erik Skultety To: libvir-list@redhat.com Subject: [libvirt PATCH 6/9] docs: html.in: Convert auditlog to rst Date: Fri, 12 Mar 2021 12:43:09 +0100 Message-Id: In-Reply-To: References: MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-loop: libvir-list@redhat.com Cc: eskultet@redhat.com X-BeenThere: libvir-list@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Development discussions about the libvirt library & tools List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: libvir-list-bounces@redhat.com Errors-To: libvir-list-bounces@redhat.com X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=libvir-list-bounces@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @redhat.com) Content-Type: text/plain; charset="utf-8" Signed-off-by: Erik Skultety Reviewed-by: Peter Krempa --- docs/auditlog.html.in | 375 ------------------------------------------ docs/auditlog.rst | 321 ++++++++++++++++++++++++++++++++++++ docs/meson.build | 2 +- 3 files changed, 322 insertions(+), 376 deletions(-) delete mode 100644 docs/auditlog.html.in create mode 100644 docs/auditlog.rst diff --git a/docs/auditlog.html.in b/docs/auditlog.html.in deleted file mode 100644 index eb00d9742e..0000000000 --- a/docs/auditlog.html.in +++ /dev/null @@ -1,375 +0,0 @@ - - - - -

Audit log

- -
    - -

    Introduction

    - -

    - A number of the libvirt virtualization drivers (QEMU/KVM and LXC) in= clude - support for logging details of important operations to the host's au= dit - subsystem. This provides administrators / auditors with a canonical = historical - record of changes to virtual machines' / containers' lifecycle state= s and - their configuration. On hosts which are running the Linux audit daem= on, - the logs will usually end up in /var/log/audit/audit.log -

    - -

    Configuration

    - -

    - The libvirt audit integration is enabled by default on any host whic= h has - the Linux audit subsystem active, and disabled otherwise. It is poss= ible - to alter this behaviour in the /etc/libvirt/libvirtd.conf - configuration file, via the audit_level parameter -

    - -
      -
    • audit_level=3D0 - libvirt auditing is disabled rega= rdless - of host audit subsystem enablement.
    • -
    • audit_level=3D1 - libvirt auditing is enabled if th= e host - audit subsystem is enabled, otherwise it is disabled. This is the - default behaviour.
    • -
    • audit_level=3D2 - libvirt auditing is enabled regar= dless - of host audit subsystem enablement. If the host audit subsystem is - disabled, then libvirtd will refuse to complete startup and exit w= ith - an error.
    • -
    - -

    - In addition to have formal messages sent to the audit subsystem it is - possible to tell libvirt to inject messages into its own logging - layer. This will result in messages ending up in the systemd journal - or /var/log/libvirt/libvirtd.log on non-systemd hosts. - This is disabled by default, but can be requested by setting the - audit_logging=3D1 configuration parameter in the same f= ile - mentioned above. -

    - -

    Message types

    - -

    - Libvirt defines three core audit message types each of which will - be described below. There are a number of common fields that will - be reported for all message types. -

    - -
    -
    pid
    -
    Process ID of the libvirtd daemon generating the audit record. -
    uid
    -
    User ID of the libvirtd daemon process generating the audit reco= rd.
    -
    subj
    -
    Security context of the libvirtd daemon process generating the a= udit record.
    -
    msg
    -
    String containing a list of key=3Dvalue pairs specific to the ty= pe of audit record being reported.
    -
    - -

    - Some fields in the msg string are common to audit recor= ds -

    - -
    -
    virt
    -
    Type of virtualization driver used. One of qemu or = lxc
    -
    vm
    -
    Host driver unique name of the guest
    -
    uuid
    -
    Globally unique identifier for the guest
    -
    exe
    -
    Path of the libvirtd daemon
    -
    hostname
    -
    Currently unused
    -
    addr
    -
    Currently unused
    -
    terminal
    -
    Currently unused
    -
    res
    -
    Result of the action, either success or faile= d
    -
    - -

    VIRT_CONTROL

    - -

    - Reports change in the lifecycle state of a virtual machine. The msg - field will include the following sub-fields -

    - -
    -
    op
    -
    Type of operation performed. One of start, st= op or init
    -
    reason
    -
    The reason which caused the operation to happen
    -
    vm-pid
    -
    ID of the primary/leading process associated with the guest
    -
    init-pid
    -
    ID of the init process in a container. Only if op=3Dinit and virt=3Dlxc
    -
    pid-ns
    -
    Namespace ID of the init process in a container. On= ly if op=3Dinit and virt=3Dlxc
    -
    - -

    VIRT_MACHINE_ID

    - -

    - Reports the association of a security context with a guest. The msg - field will include the following sub-fields -

    - -
    -
    model
    -
    The security driver type. One of selinux or a= pparmor
    -
    vm-ctx
    -
    Security context for the guest process
    -
    img-ctx
    -
    Security context for the guest disk images and other assigned ho= st resources
    -
    - -

    VIRT_RESOURCE

    - -

    - Reports the usage of a host resource by a guest. The fields include = will - vary according to the type of device being reported. When the guest = is - initially booted records will be generated for all assigned resource= s. - If any changes are made to the running guest configuration, for exam= ple - hotplug devices, or adjust resources allocation, further records will - be generated. -

    - -

    Virtual CPU

    - -

    - The msg field will include the following sub-fields -

    - -
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    resrc
    -
    The type of resource assigned. Set to vcpu
    -
    old-vcpu
    -
    Original vCPU count, or 0
    -
    new-vcpu
    -
    Updated vCPU count
    -
    - - -

    Memory

    - -

    - The msg field will include the following sub-fields -

    - -
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    resrc
    -
    The type of resource assigned. Set to mem
    -
    old-mem
    -
    Original memory size in bytes, or 0
    -
    new-mem
    -
    Updated memory size in bytes
    -
    - -

    Disk

    -

    - The msg field will include the following sub-fields -

    - -
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    resrc
    -
    The type of resource assigned. Set to disk
    -
    old-disk
    -
    Original host file or device path acting as the disk backing fil= e
    -
    new-disk
    -
    Updated host file or device path acting as the disk backing file=
    -
    - -

    Network interface

    - -

    - The msg field will include the following sub-fields -

    - -
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    resrc
    -
    The type of resource assigned. Set to net
    -
    old-net
    -
    Original MAC address of the guest network interface
    -
    new-net
    -
    Updated MAC address of the guest network interface
    -
    - -

    - If there is a host network interface associated with the guest NIC t= hen - further records may be generated -

    - -
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    resrc
    -
    The type of resource assigned. Set to net
    -
    net
    -
    MAC address of the host network interface
    -
    rdev
    -
    Name of the host network interface
    -
    - -

    Filesystem

    -

    - The msg field will include the following sub-fields -

    - -
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    resrc
    -
    The type of resource assigned. Set to fs
    -
    old-fs
    -
    Original host directory, file or device path backing the filesys= tem
    -
    new-fs
    -
    Updated host directory, file or device path backing the filesyst= em
    -
    - -

    Host device

    -

    - The msg field will include the following sub-fields -

    - -
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    resrc
    -
    The type of resource assigned. Set to hostdev or dev
    -
    dev
    -
    The unique bus identifier of the USB, PCI or SCSI device, if resrc=3Ddev
    -
    disk
    -
    The path of the block device assigned to the guest, if res= rc=3Dhostdev
    -
    chardev
    -
    The path of the character device assigned to the guest, if resrc=3Dhostdev
    -
    - -

    TPM

    -

    - The msg field will include the following sub-fields -

    - -
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    resrc
    -
    The type of resource assigned. Set to tpm or = tpm-emulator
    -
    device
    -
    The path of the host TPM device assigned to the guest
    -
    - -

    RNG

    -

    - The msg field will include the following sub-fields -

    - -
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    resrc
    -
    The type of resource assigned. Set to rng
    -
    old-rng
    -
    Original path of the host entropy source for the RNG
    -
    new-rng
    -
    Updated path of the host entropy source for the RNG
    -
    - -

    console/serial/parallel/channel<= /h4> -

    - The msg field will include the following sub-fields -

    - -
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    resrc
    -
    The type of resource assigned. Set to chardev
    -
    old-chardev
    -
    Original path of the backing character device for given emulated= device
    -
    new-chardev
    -
    Updated path of the backing character device for given emulated = device
    -
    - -

    smartcard

    -

    - The msg field will include the following sub-fields -

    - -
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    resrc
    -
    The type of resource assigned. Set to smartcard
    -
    old-smartcard
    -
    Original path of the backing character device, certificate store= or - "nss-smartcard-device" for host smartcard passthrough. -
    -
    new-smartcard
    -
    Updated path of the backing character device, certificate store = or - "nss-smartcard-device" for host smartcard passthrough. -
    -
    - -

    Redirected device

    -

    - The msg field will include the following sub-fields -

    - -
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    resrc
    -
    The type of resource assigned. Set to redir
    -
    bus
    -
    The bus type, only usb allowed
    -
    device
    -
    The device type, only USB redir allowed
    -
    - -

    Control group

    - -

    - The msg field will include the following sub-fields -

    - -
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    resrc
    -
    The type of resource assigned. Set to cgroup
    -
    cgroup
    -
    The name of the cgroup controller
    -
    - - -

    Shared memory

    -

    - The msg field will include the following sub-fields -

    - -
    -
    resrc
    -
    The type of resource assigned. Set to shmem
    -
    reason
    -
    The reason which caused the resource to be assigned to happen -
    size
    -
    The size of the shared memory region
    -
    shmem
    -
    Name of the shared memory region
    -
    source
    -
    Path of the backing character device for given emulated device -
    - - - diff --git a/docs/auditlog.rst b/docs/auditlog.rst new file mode 100644 index 0000000000..e99374ffa8 --- /dev/null +++ b/docs/auditlog.rst @@ -0,0 +1,321 @@ +=3D=3D=3D=3D=3D=3D=3D=3D=3D +Audit log +=3D=3D=3D=3D=3D=3D=3D=3D=3D + +.. contents:: + +Introduction +------------ + +A number of the libvirt virtualization drivers (QEMU/KVM and LXC) +include support for logging details of important operations to the +host's audit subsystem. This provides administrators / auditors with a +canonical historical record of changes to virtual machines' / +containers' lifecycle states and their configuration. On hosts which are +running the Linux audit daemon, the logs will usually end up in +``/var/log/audit/audit.log`` + +Configuration +------------- + +The libvirt audit integration is enabled by default on any host which +has the Linux audit subsystem active, and disabled otherwise. It is +possible to alter this behaviour in the ``/etc/libvirt/libvirtd.conf`` +configuration file, via the ``audit_level`` parameter + +- ``audit_level=3D0`` - libvirt auditing is disabled regardless of host + audit subsystem enablement. +- ``audit_level=3D1`` - libvirt auditing is enabled if the host audit + subsystem is enabled, otherwise it is disabled. This is the default + behaviour. +- ``audit_level=3D2`` - libvirt auditing is enabled regardless of host + audit subsystem enablement. If the host audit subsystem is disabled, + then libvirtd will refuse to complete startup and exit with an error. + +In addition to have formal messages sent to the audit subsystem it is +possible to tell libvirt to inject messages into its own logging layer. +This will result in messages ending up in the systemd journal or +``/var/log/libvirt/libvirtd.log`` on non-systemd hosts. This is disabled +by default, but can be requested by setting the ``audit_logging=3D1`` +configuration parameter in the same file mentioned above. + +Message types +------------- + +Libvirt defines three core audit message types each of which will be +described below. There are a number of common fields that will be +reported for all message types. + +``pid`` + Process ID of the libvirtd daemon generating the audit record. +``uid`` + User ID of the libvirtd daemon process generating the audit record. +``subj`` + Security context of the libvirtd daemon process generating the audit + record. +``msg`` + String containing a list of key=3Dvalue pairs specific to the type of + audit record being reported. + +Some fields in the ``msg`` string are common to audit records + +``virt`` + Type of virtualization driver used. One of ``qemu`` or ``lxc`` +``vm`` + Host driver unique name of the guest +``uuid`` + Globally unique identifier for the guest +``exe`` + Path of the libvirtd daemon +``hostname`` + Currently unused +``addr`` + Currently unused +``terminal`` + Currently unused +``res`` + Result of the action, either ``success`` or ``failed`` + +VIRT_CONTROL +~~~~~~~~~~~~ + +Reports change in the lifecycle state of a virtual machine. The ``msg`` +field will include the following sub-fields + +``op`` + Type of operation performed. One of ``start``, ``stop`` or ``init`` +``reason`` + The reason which caused the operation to happen +``vm-pid`` + ID of the primary/leading process associated with the guest +``init-pid`` + ID of the ``init`` process in a container. Only if ``op=3Dinit`` and + ``virt=3Dlxc`` +``pid-ns`` + Namespace ID of the ``init`` process in a container. Only if + ``op=3Dinit`` and ``virt=3Dlxc`` + +VIRT_MACHINE_ID +~~~~~~~~~~~~~~~ + +Reports the association of a security context with a guest. The ``msg`` +field will include the following sub-fields + +``model`` + The security driver type. One of ``selinux`` or ``apparmor`` +``vm-ctx`` + Security context for the guest process +``img-ctx`` + Security context for the guest disk images and other assigned host + resources + +VIRT_RESOURCE +~~~~~~~~~~~~~ + +Reports the usage of a host resource by a guest. The fields include will +vary according to the type of device being reported. When the guest is +initially booted records will be generated for all assigned resources. +If any changes are made to the running guest configuration, for example +hotplug devices, or adjust resources allocation, further records will be +generated. + +Virtual CPU +^^^^^^^^^^^ + +The ``msg`` field will include the following sub-fields + +``reason`` + The reason which caused the resource to be assigned to happen +``resrc`` + The type of resource assigned. Set to ``vcpu`` +``old-vcpu`` + Original vCPU count, or 0 +``new-vcpu`` + Updated vCPU count + +Memory +^^^^^^ + +The ``msg`` field will include the following sub-fields + +``reason`` + The reason which caused the resource to be assigned to happen +``resrc`` + The type of resource assigned. Set to ``mem`` +``old-mem`` + Original memory size in bytes, or 0 +``new-mem`` + Updated memory size in bytes + +Disk +^^^^ + +The ``msg`` field will include the following sub-fields + +``reason`` + The reason which caused the resource to be assigned to happen +``resrc`` + The type of resource assigned. Set to ``disk`` +``old-disk`` + Original host file or device path acting as the disk backing file +``new-disk`` + Updated host file or device path acting as the disk backing file + +Network interface +^^^^^^^^^^^^^^^^^ + +The ``msg`` field will include the following sub-fields + +``reason`` + The reason which caused the resource to be assigned to happen +``resrc`` + The type of resource assigned. Set to ``net`` +``old-net`` + Original MAC address of the guest network interface +``new-net`` + Updated MAC address of the guest network interface + +If there is a host network interface associated with the guest NIC then +further records may be generated + +``reason`` + The reason which caused the resource to be assigned to happen +``resrc`` + The type of resource assigned. Set to ``net`` +``net`` + MAC address of the host network interface +``rdev`` + Name of the host network interface + +Filesystem +^^^^^^^^^^ + +The ``msg`` field will include the following sub-fields + +``reason`` + The reason which caused the resource to be assigned to happen +``resrc`` + The type of resource assigned. Set to ``fs`` +``old-fs`` + Original host directory, file or device path backing the filesystem +``new-fs`` + Updated host directory, file or device path backing the filesystem + +Host device +^^^^^^^^^^^ + +The ``msg`` field will include the following sub-fields + +``reason`` + The reason which caused the resource to be assigned to happen +``resrc`` + The type of resource assigned. Set to ``hostdev`` or ``dev`` +``dev`` + The unique bus identifier of the USB, PCI or SCSI device, if + ``resrc=3Ddev`` +``disk`` + The path of the block device assigned to the guest, if + ``resrc=3Dhostdev`` +``chardev`` + The path of the character device assigned to the guest, if + ``resrc=3Dhostdev`` + +TPM +^^^ + +The ``msg`` field will include the following sub-fields + +``reason`` + The reason which caused the resource to be assigned to happen +``resrc`` + The type of resource assigned. Set to ``tpm`` or ``tpm-emulator`` +``device`` + The path of the host TPM device assigned to the guest + +RNG +^^^ + +The ``msg`` field will include the following sub-fields + +``reason`` + The reason which caused the resource to be assigned to happen +``resrc`` + The type of resource assigned. Set to ``rng`` +``old-rng`` + Original path of the host entropy source for the RNG +``new-rng`` + Updated path of the host entropy source for the RNG + +console/serial/parallel/channel +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +The ``msg`` field will include the following sub-fields + +``reason`` + The reason which caused the resource to be assigned to happen +``resrc`` + The type of resource assigned. Set to ``chardev`` +``old-chardev`` + Original path of the backing character device for given emulated + device +``new-chardev`` + Updated path of the backing character device for given emulated + device + +smartcard +^^^^^^^^^ + +The ``msg`` field will include the following sub-fields + +``reason`` + The reason which caused the resource to be assigned to happen +``resrc`` + The type of resource assigned. Set to ``smartcard`` +``old-smartcard`` + Original path of the backing character device, certificate store or + "nss-smartcard-device" for host smartcard passthrough. +``new-smartcard`` + Updated path of the backing character device, certificate store or + "nss-smartcard-device" for host smartcard passthrough. + +Redirected device +^^^^^^^^^^^^^^^^^ + +The ``msg`` field will include the following sub-fields + +``reason`` + The reason which caused the resource to be assigned to happen +``resrc`` + The type of resource assigned. Set to ``redir`` +``bus`` + The bus type, only ``usb`` allowed +``device`` + The device type, only ``USB redir`` allowed + +Control group +^^^^^^^^^^^^^ + +The ``msg`` field will include the following sub-fields + +``reason`` + The reason which caused the resource to be assigned to happen +``resrc`` + The type of resource assigned. Set to ``cgroup`` +``cgroup`` + The name of the cgroup controller + +Shared memory +^^^^^^^^^^^^^ + +The ``msg`` field will include the following sub-fields + +``resrc`` + The type of resource assigned. Set to ``shmem`` +``reason`` + The reason which caused the resource to be assigned to happen +``size`` + The size of the shared memory region +``shmem`` + Name of the shared memory region +``source`` + Path of the backing character device for given emulated device diff --git a/docs/meson.build b/docs/meson.build index 0e0c266cb9..f80a08112e 100644 --- a/docs/meson.build +++ b/docs/meson.build @@ -32,7 +32,6 @@ docs_assets =3D [ =20 docs_html_in_files =3D [ '404', - 'auditlog', 'auth', 'bindings', 'bugs', @@ -107,6 +106,7 @@ docs_rst_files =3D [ 'api', 'apps', 'architecture', + 'auditlog', 'best-practices', 'ci', 'coding-style', --=20 2.29.2