Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp4793224pxk; Wed, 30 Sep 2020 11:49:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyhOjd63pzNZCvHQa3T4KmvZTwKeZ5D5WRQUIZelsl37OZUZGLpTfTKDJUqRKG3oRetrJPI X-Received: by 2002:a17:906:3e4e:: with SMTP id t14mr4117225eji.269.1601491756369; Wed, 30 Sep 2020 11:49:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601491756; cv=none; d=google.com; s=arc-20160816; b=mqkNzHIaanKgi2QtW6lXK2fCgTapnJ9BbbO84WzrpFyWPAprYAnLFqVb7NxTImXbh9 TPSkzmiXeKXiUM2Cugizh+kpZGAEGxb5O7p37Qje9UpsHOVIo7WsMHx7Zqi7SjDUMcpY 5GpNt6+FeoWuomqq4pOiHaRUD7b2faqKnaT8KE8G0gYlNAby4n8KVNZfngeAtUL7jP8g Acgr/xY9kOeXEBjr+PO9TptZEkE/MWCjAqOODD2MJsdFmgii7MHxIYP9aaLAMfzTawio Y9EcK9L0MUJ7vYnPv8nZxhYHzOQD6Ltztys2Dt29J4OzHNtnz1IU9/2JLaZJNXhipYmr PHBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=SGzLtpbRpyaKc9iOQICUykGsO9umWBAinEJFBiGHtng=; b=mDSs5ezG9DX8SMscI39DYpw/GMGitXxfgz6NS8IImOj+m0WvR3PgIrqcRacJMwhbcG vmF40kNmQRbE6Sv+3phRJbv8fymzeq66D9V9NdirmuLM0QxDS9ArFs0NJbK+nfGkLSZT qZ66kFIAcetw9BQupqj3qUVQFnl7WTvs4v9I/IAveqvqNAWyz/GYHmwHG/BMTy//dXqG vxy1pniWXgyzdDfpuf+Sg60wJKNmWB9Y/FytJFb7HMlTNcZqebhhsGSc8zMSCoGNCXWD niirAPXI+fLiR+5sz0wCXgU3wLRbMWruUeF5kbTo23HItyQz5R8rA6PmO0RJSV9xPcES n29Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=temperror (no key for signature) header.i=@szeredi.hu header.s=google header.b=dJWhnJzX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p18si1794726ejd.537.2020.09.30.11.48.52; Wed, 30 Sep 2020 11:49:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=temperror (no key for signature) header.i=@szeredi.hu header.s=google header.b=dJWhnJzX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726992AbgI3SpW (ORCPT + 99 others); Wed, 30 Sep 2020 14:45:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44440 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725771AbgI3SpW (ORCPT ); Wed, 30 Sep 2020 14:45:22 -0400 Received: from mail-vk1-xa44.google.com (mail-vk1-xa44.google.com [IPv6:2607:f8b0:4864:20::a44]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8075DC061755 for ; Wed, 30 Sep 2020 11:45:20 -0700 (PDT) Received: by mail-vk1-xa44.google.com with SMTP id e5so584191vkm.2 for ; Wed, 30 Sep 2020 11:45:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=szeredi.hu; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=SGzLtpbRpyaKc9iOQICUykGsO9umWBAinEJFBiGHtng=; b=dJWhnJzXxyoPQfBVXBIJ6EVktE1NPNjYtegiVBmX4eTfTGsrPOjp5EyLKMMmwl+XYz qCk7f27p1Y3t5oTP3QfoCu9E4CVXj1U0WvHKmU3L3AFbOX8s+yKHzILQu/C7dRI9GsW5 riM9Yhn5kFjDJRXBflBP/Gap/RA2diJTzgevM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=SGzLtpbRpyaKc9iOQICUykGsO9umWBAinEJFBiGHtng=; b=fIUIZImh61OwSHoTOEXvu0O3ZvQiZSacM/FB4B3324wq25Kr9ni1EGLKiW9WFkvsP/ /qEuMSv6JFsPLHeOeIAJt/uRBTCAEAUkExoJeVZZER4Kg6QI1xfwGLmFlDrx2eOH3e3b yX/pNogAND+Ypl6Gx0YRi4qE7Jb9zEtRHuCUmh4LuOQ8TM6tOajzabiPo8yt36kaRCWH RW4ySdNEvNh9a8qli5VR3d0QhaGojM3TgsmaXbW5xPBv2Olv1Hdcaa+NOijwgNMtMrYs 6AWH1XndTX/pjokAL8el11FM79bfQfoTk3zAKI1apFjjzpF/ghz/M4C3nCb4ohvezAa7 FUIA== X-Gm-Message-State: AOAM533EnphlC2xg2o/2gBxNVWlbNNhCaPNH6Oye0c1ZfMKijOarrRDP AXM8l5/Rxk3F8fFVxvK0VnurKK1rcwnl8WrMVJllUw== X-Received: by 2002:a05:6122:45e:: with SMTP id f30mr2504191vkk.15.1601491519617; Wed, 30 Sep 2020 11:45:19 -0700 (PDT) MIME-Version: 1.0 References: <20200924131318.2654747-1-balsini@android.com> <20200924131318.2654747-3-balsini@android.com> In-Reply-To: <20200924131318.2654747-3-balsini@android.com> From: Miklos Szeredi Date: Wed, 30 Sep 2020 20:45:08 +0200 Message-ID: Subject: Re: [PATCH V9 2/4] fuse: Trace daemon creds To: Alessio Balsini Cc: Akilesh Kailash , Amir Goldstein , Antonio SJ Musumeci , David Anderson , Giuseppe Scrivano , Jann Horn , Jens Axboe , Martijn Coenen , Palmer Dabbelt , Paul Lawrence , Stefano Duo , Zimuzo Ezeozue , fuse-devel , kernel-team , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 24, 2020 at 3:13 PM Alessio Balsini wrote: > > Add a reference to the FUSE daemon credentials, so that they can be used to > temporarily raise the user credentials when accessing lower file system > files in passthrough. Hmm, I think it would be better to store the creds of the ioctl() caller together with the open file. The mounter may deliberately have different privileges from the process doing the actual I/O. Thanks, Miklos