On Mon, Mar 31, 2014 at 11:44:59AM +0100, One Thousand Gnomes wrote: > On Wed, 26 Mar 2014 17:23:24 -0700 > Andy Lutomirski <luto@xxxxxxxxxxxxxx> wrote: > > > Hi various people who care about user-space NFS servers and/or > > security-relevant APIs. > > > > I propose the following set of new syscalls: > > > > int credfd_create(unsigned int flags): returns a new credfd that > > corresponds to current's creds. > > > > int credfd_activate(int fd, unsigned int flags): Change current's > > creds to match the creds stored in fd. To be clear, this changes both > > the "subjective" and "objective" (aka real_cred and cred) because > > there aren't any real semantics for what happens when userspace code > > runs with real_cred != cred. > > What is the sematic of a simultaneous ptrace racing a credfd_activate on > another processor core ? > > What are the rules for simultaneous threads doing I/O and and credential > changes ? > > What is the rule for a faulting of an mmapped page in a multithreaded app > one thread of which has changed credentials ? > > Who owns a file created while you are changing credentials ? > > > - credfd_activate fails (-EINVAL) if dumpable. This is because we > > don't want a privileged daemon to be ptraced while impersonating > > someone else. > > That's one of the obvious problems but if you have that problem then > you've got races against signals and ptrace etc to deal with. FYI, Any process using pthreads and glibc already has to cope with these races as setresuid on glibc on Linux is not atomic. That's why Samba eventually changed to using the raw system calls on Linux due to an interesting bug with glibc aio interacting with setresuid races (receiving signal thread was uid 0, sending aio thread was non-zero - signal couldn't be delivered, glibc aio wakeup lost). Jeremy. -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html