Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp5792290pxu; Thu, 22 Oct 2020 11:07:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzEglIGkveR7XSx6mevu2BAcrlW/UmvAT3xyeaF+OwOZxq/hm40gKULdskCHHZ02ia964Vj X-Received: by 2002:aa7:da05:: with SMTP id r5mr3345654eds.184.1603390069417; Thu, 22 Oct 2020 11:07:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603390069; cv=none; d=google.com; s=arc-20160816; b=q+lXlyz3PMkflFR1nSHlWCawEVpYt+Czz5LG1Yt2c3ZC+0CwhEPL+bZL3na+zSEPkI NNYtUQNFr6GmFay1n6AeL4BMoyC6bOJ6sM2vEHmOBfV8CHUoIuU2AgrlWjxLSza4eCPT Av3ZTpA9jqeZjMXePc91iHgXZMY0zBetR8/BgyEqxGgIn84iATb3H9ipzbNUJwjFElRn OYDGPgipInYNrHAwd0HBzO2LQ0gWIYDLTKRMwZfE0hvG0unuwn0EVJUzL3W8cXOj1JfL Il2Pvp9ZPh/psYr5cOFwuHMXmBeqjz/C9Ov4KrnVq2h6fjUcMmLVyKzhQfa5MjQBIMsY 4LtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=3U9VBQBuc5Q3i6L3LlgG5vm2ptKkL3S7VBdp7klPUkY=; b=MZSCW1TX2uveYEC70u6zTxwBULzllOO8BLauEFw+z+ibQNAZ6wrBa1umC3RgEzhbIQ nggijAvtDE+vrrMcKhhZ/+Glc+WOJU00R8VgfuQ01l7OPX9JvhfZBBFfYJGP8Hvd7sXf 3hthg7Lmequy5tCMAg+35t0G5W72OLMNt9A+zR+vm8YyvK46itNG+YR9OQMgR0XvCLgA tuauMPJlYdGRI1XqoLPIf9Or50yQKhLK8DcgPhTyK/r+wKM6rS1ovtKSDqnktkBXpn0q HXIeWIPKEF8a4XeJXs4F+vxc0Viqi/iPoCW9F8m2cixJNSFJUBf9qvIJ70PXzIFNx0Yk b8fA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@android.com header.s=20161025 header.b=PEYN4AsJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=android.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k25si1657057ejk.65.2020.10.22.11.07.26; Thu, 22 Oct 2020 11:07:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@android.com header.s=20161025 header.b=PEYN4AsJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=android.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2901592AbgJVQPC (ORCPT + 99 others); Thu, 22 Oct 2020 12:15:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49758 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2901497AbgJVQPC (ORCPT ); Thu, 22 Oct 2020 12:15:02 -0400 Received: from mail-wm1-x342.google.com (mail-wm1-x342.google.com [IPv6:2a00:1450:4864:20::342]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3FD65C0613CE for ; Thu, 22 Oct 2020 09:15:01 -0700 (PDT) Received: by mail-wm1-x342.google.com with SMTP id v5so2746889wmh.1 for ; Thu, 22 Oct 2020 09:15:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=android.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=3U9VBQBuc5Q3i6L3LlgG5vm2ptKkL3S7VBdp7klPUkY=; b=PEYN4AsJm8FDRp0ciErKiSuDO3vSuEtAXt/TwjxSfS3UmqAo/9E+9UHg9mZ7FsrDOP PghzW/3E/2e0pbnWYvSPIt2MgVRdQCg2QmP/io79OGC0bWxIY5XdFuRrn1MuMca/fNO4 4XD6CeiZyXyL9F1vavHftdBs1Idoif6I4wJmX34miYnovS9W8s6noeKUcbCh6O+z2fgO ZCDw+pYWY0Kf/9vm3TLsV6iboROjgsHp7mwk+eB+HINK7GsUt8jMQsJMB6plLj0JSHvi MUgeRLx9LLmXJwE4OVq2h3trduU2kxeGHDtPJKq/sXYGoehcl8QPQUz/HrTQ0c19n991 2o5Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=3U9VBQBuc5Q3i6L3LlgG5vm2ptKkL3S7VBdp7klPUkY=; b=dj8hxtKTvrIuNi+VmgEXoCxMXTp93PZKq+/Zkt5AWTrzUC9cEnB+HPfjyJvrr5ggpQ mJC419E3POh6AyonhYdA2ExrgApmlQFDtPCixgZL9xf7HRZMedBjMNlmlk+7fWpkPGEX 7H5IKZQQXwzGPewpKllrWdHr29UBQivwWJJyYh/bUMfr1guln+I8LgRKRoYG6KFSITQh deBHfObBTPxa1eWMvRioHX8GNxbQIBp25D6VPZjtr1CG881EXg3EOlgG5pkJDJu16Vle /2aJvxzg3lV5CFQhFxYT250BjJfDq4nPo2JLM7HdweJVpg2lZNnPIx+0cR4CE2I/U7D9 a/+Q== X-Gm-Message-State: AOAM532wdHNgy3UM6A3CbIGO+3lbhBk6Vb9KTIUJGERFHB1Cpq8mYR3C ZcXMNTHE6xP76bHfDeFEUm6P3Q== X-Received: by 2002:a1c:e089:: with SMTP id x131mr3440562wmg.78.1603383299988; Thu, 22 Oct 2020 09:14:59 -0700 (PDT) Received: from google.com ([2a00:79e0:d:210:7220:84ff:fe09:7d5c]) by smtp.gmail.com with ESMTPSA id c130sm3983763wma.1.2020.10.22.09.14.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 22 Oct 2020 09:14:59 -0700 (PDT) Date: Thu, 22 Oct 2020 17:14:57 +0100 From: Alessio Balsini To: Antonio SJ Musumeci Cc: Miklos Szeredi , Alessio Balsini , Akilesh Kailash , Amir Goldstein , David Anderson , Giuseppe Scrivano , Jann Horn , Jens Axboe , Martijn Coenen , Palmer Dabbelt , Paul Lawrence , Stefano Duo , Zimuzo Ezeozue , fuse-devel , kernel-team , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH V9 2/4] fuse: Trace daemon creds Message-ID: <20201022161457.GB36774@google.com> References: <20200924131318.2654747-1-balsini@android.com> <20200924131318.2654747-3-balsini@android.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 30, 2020 at 03:16:20PM -0400, Antonio SJ Musumeci wrote: > On 9/30/2020 2:45 PM, Miklos Szeredi wrote: > > On Thu, Sep 24, 2020 at 3:13 PM Alessio Balsini wrote: > > > Add a reference to the FUSE daemon credentials, so that they can be used to > > > temporarily raise the user credentials when accessing lower file system > > > files in passthrough. > > Hmm, I think it would be better to store the creds of the ioctl() > > caller together with the open file. The mounter may deliberately > > have different privileges from the process doing the actual I/O. > > > > Thanks, > > Miklos > > > In my usecase I'm changing euid/egid of the thread to whichever the uid/gid > was passed to the server which is otherwise running as root. > Ack, in the next patch set I will store the creds of the ioctl() caller. Thanks, Alessio