From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.8 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6031DC4727C for ; Wed, 30 Sep 2020 18:45:22 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id D4D5920708 for ; Wed, 30 Sep 2020 18:45:21 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="key not found in DNS" (0-bit key) header.d=szeredi.hu header.i=@szeredi.hu header.b="dJWhnJzX" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725872AbgI3SpV (ORCPT ); Wed, 30 Sep 2020 14:45:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44444 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725771AbgI3SpU (ORCPT ); Wed, 30 Sep 2020 14:45:20 -0400 Received: from mail-vk1-xa43.google.com (mail-vk1-xa43.google.com [IPv6:2607:f8b0:4864:20::a43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 887DCC0613D0 for ; Wed, 30 Sep 2020 11:45:20 -0700 (PDT) Received: by mail-vk1-xa43.google.com with SMTP id a16so579500vke.3 for ; Wed, 30 Sep 2020 11:45:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=szeredi.hu; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=SGzLtpbRpyaKc9iOQICUykGsO9umWBAinEJFBiGHtng=; b=dJWhnJzXxyoPQfBVXBIJ6EVktE1NPNjYtegiVBmX4eTfTGsrPOjp5EyLKMMmwl+XYz qCk7f27p1Y3t5oTP3QfoCu9E4CVXj1U0WvHKmU3L3AFbOX8s+yKHzILQu/C7dRI9GsW5 riM9Yhn5kFjDJRXBflBP/Gap/RA2diJTzgevM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=SGzLtpbRpyaKc9iOQICUykGsO9umWBAinEJFBiGHtng=; b=rzPqyP3N6EzvCri/yVm1kb441nwbctszruADrRMru8SW8C2ckFU1JXDmBCzoMulCjh bAbaKltD+27YCU+L1iR65pBVChxz6dM7i0+IRxQUuvPn4J0nQL5HUst/ikX1JYFEK7g9 8RTbjqT+bmvdlS77hXWhRDlbJ9RSMbA5B5qSmSOu2EQZ1JwW10aeZUUdWm0pyQkhExOM V6i0MS9NKU1HYNXPKWnSQtpsCsbtJKXUcvkX6WgMGR67xbhpA+h++4Cumt+j04/aVLQE wXCx+MjuihGZmlKcF2zOtTD0MHU+MmH7rt6abrTfMN+g7mfbU1WDy+OjODg9b3jrsm3f lgMg== X-Gm-Message-State: AOAM531iP0OAdklLbU3O++QU7K0WACAzFoTfD0mWx7c3NcDSCEt8MU8D 89+vfTkaH4RwSGwRSS14ylpM/MogHCvDl85Fd2KNsg== X-Google-Smtp-Source: ABdhPJx4T7kOH+8bLfRu9O7gr7DxvvWi/8nfIaGCxMLRUEsx6s1rZzg4WbdXu1inmEObaBZd5SAPkEXfL95gJGKuOiM= X-Received: by 2002:a05:6122:45e:: with SMTP id f30mr2504191vkk.15.1601491519617; Wed, 30 Sep 2020 11:45:19 -0700 (PDT) MIME-Version: 1.0 References: <20200924131318.2654747-1-balsini@android.com> <20200924131318.2654747-3-balsini@android.com> In-Reply-To: <20200924131318.2654747-3-balsini@android.com> From: Miklos Szeredi Date: Wed, 30 Sep 2020 20:45:08 +0200 Message-ID: Subject: Re: [PATCH V9 2/4] fuse: Trace daemon creds To: Alessio Balsini Cc: Akilesh Kailash , Amir Goldstein , Antonio SJ Musumeci , David Anderson , Giuseppe Scrivano , Jann Horn , Jens Axboe , Martijn Coenen , Palmer Dabbelt , Paul Lawrence , Stefano Duo , Zimuzo Ezeozue , fuse-devel , kernel-team , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-fsdevel@vger.kernel.org On Thu, Sep 24, 2020 at 3:13 PM Alessio Balsini wrote: > > Add a reference to the FUSE daemon credentials, so that they can be used to > temporarily raise the user credentials when accessing lower file system > files in passthrough. Hmm, I think it would be better to store the creds of the ioctl() caller together with the open file. The mounter may deliberately have different privileges from the process doing the actual I/O. Thanks, Miklos