Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756467Ab0DUUXq (ORCPT ); Wed, 21 Apr 2010 16:23:46 -0400 Received: from e35.co.us.ibm.com ([32.97.110.153]:39278 "EHLO e35.co.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756389Ab0DUUXo (ORCPT ); Wed, 21 Apr 2010 16:23:44 -0400 Date: Wed, 21 Apr 2010 15:23:25 -0500 From: "Serge E. Hallyn" To: "Eric W. Biederman" Cc: Alan Cox , lkml , David Howells , Ashwin Ganti , Greg KH , rsc@swtch.com, ericvh@gmail.com, linux-security-module@vger.kernel.org, Ron Minnich , jt.beard@gmail.com, Andrew Morton , Andrew Morgan , oleg@us.ibm.com, Eric Paris , linux-api@vger.kernel.org, Randy Dunlap Subject: Re: [PATCH 3/3] p9auth: add p9auth driver Message-ID: <20100421202325.GC30745@us.ibm.com> References: <20100421012749.GA21338@us.ibm.com> <20100421012908.GB24251@us.ibm.com> <20100421102739.6ad932fb@lxorguk.ukuu.org.uk> <20100421133917.GB16326@us.ibm.com> <20100421151917.5ae20265@lxorguk.ukuu.org.uk> <20100421150900.GB31880@us.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.20 (2009-06-14) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1745 Lines: 48 Quoting Eric W. Biederman (ebiederm@xmission.com): > "Serge E. Hallyn" writes: > > > Ignoring namespaces for a moment, I guess we could do something like > > > > struct credentials_pass { > > pid_t global_pid; > > unsigned long unique_id; > > uid_t new_uid; > > gid_t new_gid; > > int num_aux_gids; > > gid_t aux_gids[]; > > } > > This looks surprising like what I am doing in passing uids and pids > through unix domain sockets. > > So if this looks like a direction we want to go it shouldn't be too > difficult. > > >> That also btw needs fixing for other reasons - more than one daemon has > >> been written that generically uses recvmsg and so can be attacked with FD > >> leaks >-) > > > > Yup. > > > > (By 'needs fixing' you just mean needs to be done right for this > > service? Else I think I'm missing something...) > > Remember my unix domain socket and the patch for converting struct cred > into a new context, from a month or so ago. I think that is what we > are talking about. Zoinks! After some digging I found it in my containers.mbox and at https://lists.linux-foundation.org/pipermail/containers/2010-March/023405.html and see you even called me out. Sorry! I see your tree at http://git.kernel.org/gitweb.cgi?p=linux/kernel/git/ebiederm/linux-2.6.33-nsfd-v5.git;a=summary and commit "af_unix: Allow SO_PEERCRED to work across namespaces", and it all looks good. Definately useful for a SO_PASSCRED or somesuch implementation. thanks, -serge -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/