On 2017年12月05日 16:25, Misono, Tomohiro wrote:
> Hello all,
> 
> I want to address some issues of subvolume usability for a normal user.
> i.e. a user can create subvolumes, but
>  - Cannot delete their own subvolume (by default)
>  - Cannot tell subvolumes from directories (in a straightforward way)
>  - Cannot check the quota limit when qgroup is enabled
> 
> Here I show the initial thoughts and approaches to this problem.
> I want to check if this is a right approach or not before I start writing 
> code.
> 
> Comments are welcome.
> Tomohiro Misono
> 
> ==========
> - Goal and current problem
> The goal of this RFC is to give a normal user more control to their own 
> subvolumes.
> Currently the control to subvolumes for a normal user is restricted as below: 
> 
> +-------------+------+------+
> |   command   | root | user |
> +-------------+------+------+
> | sub create  | Y    | Y    |
> | sub snap    | Y    | Y    |
> | sub del     | Y    | N    |
> | sub list    | Y    | N    |
> | sub show    | Y    | N    |
> | qgroup show | Y    | N    |
> +-------------+------+------+
> 
> In short, I want to change this as below in order to improve user's usability:
> 
> +-------------+------+--------+
> |   command   | root | user   |
> +-------------+------+--------+
> | sub create  | Y    | Y      |
> | sub snap    | Y    | Y      |
> | sub del     | Y    | N -> Y |
> | sub list    | Y    | N -> Y |
> | sub show    | Y    | N -> Y |
> | qgroup show | Y    | N -> Y |
> +-------------+------+--------+
> 
> In words,
> (1) allow deletion of subvolume if a user owns it, and 
> (2) allow getting subvolume/quota info if a user has read access to it
>  (sub list/qgroup show just lists the subvolumes which are readable by the 
> user)
> 
> I think other commands not listed above (qgroup limit, send/receive etc.) 
> should
> be done by root and not be allowed for a normal user.
> 
> 
> - Outside the scope of this RFC
> There is a qualitative problem to use qgroup for limiting user disk amount;
> quota limit can easily be averted by creating a subvolume. I think that 
> forcing
> inheriting quota of parent subvolume is a solution, but I won't address nor
> discuss this here. 
> 
> 
> - Proposal
>  (1) deletion of subvolume
> 
>   I want to change the default behavior to allow a user to delete their own
>   subvolumes.
>   
>   This is not the same behavior as when user_subvol_rm_alowed mount option is
>   specified; in that case a user can delete the subvolume to which they have
>   write+exec right.
>   
>   Since snapshot creation is already restricted to the subvolume owner, it is
>   consistent that only the owner of the subvolume (or root) can delete it.
>   
>   The implementation should be straightforward.

Personally speaking, I prefer to do the complex owner check in user daemon.

And do the privilege in user daemon (call it btrfsd for example).

So btrfs-progs will works in 2 modes, if root calls it, do as it used to do.
If normal user calls it, proxy the request to btrfsd, and btrfsd does
the privilege checking and call ioctl (with root privilege).

Then no impact to kernel, all complex work is done in user space.

> 
>  (2) getting subvolume/quota info
> 
>   TREE_SEARCH ioctl is used to retrieve the subvolume/quota info by 
> btrfs-progs
>   (sub show/list, qgroup show etc.). This requires the root permission.
>   
>   The easiest way to allow a user to get subvolume/quota info is just relaxing
>   the permission of TREE_SEARCH. However, since all the tree information (inc.
>   file name) will be exposed, this poses a sequrity risk and is not 
> acceptable.
>   
>   So, I want to introduce 2 ioctls to get subvolume/quota info respectively 
> for
>   a normal user, which return only the info readable by the user:
>   
>    [subvolume info]
>     Mainly search ROOT tree for ROOT_ITEM/ROOT_BACKREF, but check its read
>    right by searching FS/FILE tree and comparing it with caller's uid.
>   
>    [quota info]
>     Same as above, but mainly search QUOTA tree and only returns level 0 info.
>   
>   Also, in order to construct subvolume path, permission of INO_LOOKUP ioctl
>   needs to be relaxed for the user who has read access to the subvolume.

Same method can apply to this either.

Thanks,
Qu
> 
> 
> - Summary of Proposal
>  - Change the default behavior to allow a user to delete their own subvolumes
>  - Add 2 new non-root ioctls to get subvolume/quota info for accessible 
> subvolumes
> ==========
> 
> --
> To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
> the body of a message to majord...@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> 

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to