On 2017-12-05 03:43, Qu Wenruo wrote:
On 2017年12月05日 16:25, Misono, Tomohiro wrote:
Hello all,
I want to address some issues of subvolume usability for a normal user.
i.e. a user can create subvolumes, but
- Cannot delete their own subvolume (by default)
- Cannot tell subvolumes from directories (in a straightforward way)
- Cannot check the quota limit when qgroup is enabled
Here I show the initial thoughts and approaches to this problem.
I want to check if this is a right approach or not before I start writing code.
Comments are welcome.
Tomohiro Misono
==========
- Goal and current problem
The goal of this RFC is to give a normal user more control to their own
subvolumes.
Currently the control to subvolumes for a normal user is restricted as below:
+-------------+------+------+
| command | root | user |
+-------------+------+------+
| sub create | Y | Y |
| sub snap | Y | Y |
| sub del | Y | N |
| sub list | Y | N |
| sub show | Y | N |
| qgroup show | Y | N |
+-------------+------+------+
In short, I want to change this as below in order to improve user's usability:
+-------------+------+--------+
| command | root | user |
+-------------+------+--------+
| sub create | Y | Y |
| sub snap | Y | Y |
| sub del | Y | N -> Y |
| sub list | Y | N -> Y |
| sub show | Y | N -> Y |
| qgroup show | Y | N -> Y |
+-------------+------+--------+
In words,
(1) allow deletion of subvolume if a user owns it, and
(2) allow getting subvolume/quota info if a user has read access to it
(sub list/qgroup show just lists the subvolumes which are readable by the
user)
I think other commands not listed above (qgroup limit, send/receive etc.) should
be done by root and not be allowed for a normal user.
- Outside the scope of this RFC
There is a qualitative problem to use qgroup for limiting user disk amount;
quota limit can easily be averted by creating a subvolume. I think that forcing
inheriting quota of parent subvolume is a solution, but I won't address nor
discuss this here.
- Proposal
(1) deletion of subvolume
I want to change the default behavior to allow a user to delete their own
subvolumes.
This is not the same behavior as when user_subvol_rm_alowed mount option is
specified; in that case a user can delete the subvolume to which they have
write+exec right.
Since snapshot creation is already restricted to the subvolume owner, it is
consistent that only the owner of the subvolume (or root) can delete it.
The implementation should be straightforward.
Personally speaking, I prefer to do the complex owner check in user daemon.
And do the privilege in user daemon (call it btrfsd for example).
So btrfs-progs will works in 2 modes, if root calls it, do as it used to do.
If normal user calls it, proxy the request to btrfsd, and btrfsd does
the privilege checking and call ioctl (with root privilege).
Then no impact to kernel, all complex work is done in user space.
Exactly how hard is it to just check ownership of the root inode of a
subvolume from the ioctl context? You could just as easily push all the
checking out to the VFS layer by taking an open fd for the subvolume
root (and probably implicitly closing it) instead of taking a path, and
that would give you all the benefits of ACL's and whatever security
modules the local system is using. Alternatively, quit treating
subvolumes specially for `unlink()`, and make them behave like regular
directories (and thus avoid the one possible complication resulting from
home directories being subvolumes but needing to be owned by the users).
<rant>
This whole 'just make it a daemon' thing that's becoming the standard
solution everywhere these days is crap in most cases (note that I'm not
just singling out this proposal here). Just because systemd does it
doesn't make it a good idea, especially when it makes things like this
far more opaque than they really need to be, which in turn makes it a
pain in the arse to debug _anything_ to do with permissions beyond basic
file access.
</rant>
In almost all cases, the desired check is to allow root, possibly admin
users who have filesystem management permissions (usually exactly one
group), and the owner. That is trivial to implement with a single ACL
entry and basic filesystem permissions without needing some special
daemon to check them provided we route things through the VFS layer
somehow. In the rare cases that that's not what's wanted, then the
system is almost certainly using an LSM, and the checks can be made there.
(2) getting subvolume/quota info
TREE_SEARCH ioctl is used to retrieve the subvolume/quota info by btrfs-progs
(sub show/list, qgroup show etc.). This requires the root permission.
The easiest way to allow a user to get subvolume/quota info is just relaxing
the permission of TREE_SEARCH. However, since all the tree information (inc.
file name) will be exposed, this poses a sequrity risk and is not acceptable.
So, I want to introduce 2 ioctls to get subvolume/quota info respectively for
a normal user, which return only the info readable by the user:
[subvolume info]
Mainly search ROOT tree for ROOT_ITEM/ROOT_BACKREF, but check its read
right by searching FS/FILE tree and comparing it with caller's uid.
[quota info]
Same as above, but mainly search QUOTA tree and only returns level 0 info.
Also, in order to construct subvolume path, permission of INO_LOOKUP ioctl
needs to be relaxed for the user who has read access to the subvolume.
Same method can apply to this either.
Thanks,
Qu
- Summary of Proposal
- Change the default behavior to allow a user to delete their own subvolumes
- Add 2 new non-root ioctls to get subvolume/quota info for accessible
subvolumes
--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html