Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp8020194rwi; Tue, 25 Oct 2022 01:06:02 -0700 (PDT) X-Google-Smtp-Source: AMsMyM55kF2ERT6QkZLy7AKvhGTFD0LTrZVWPwfI0NA2rKbGhvBnQbpJMU2fy6Bpn2oXEv0goLgL X-Received: by 2002:a17:906:844c:b0:78d:ce8f:fc81 with SMTP id e12-20020a170906844c00b0078dce8ffc81mr31814388ejy.128.1666685161690; Tue, 25 Oct 2022 01:06:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666685161; cv=none; d=google.com; s=arc-20160816; b=qZ5Y42Nx1Bmbh7EnXE+KMUAcUjuLpQDNGqoPHCb93+mWP/zus62OGKwdqbudONMSbd 3IIyc69PqJUcKZfGvfS+2e8NX/akD8pD55AzBtkwPRfNKI4VyfFTIadJztp4Wewr3Cpd Cop3GOzxxj3qxhRlvExgM9axKdN/t+EHTQp/4XlFQa/2JFz86edDAl2zzC/8m4jehf2S NvayXCNemOu4ESRGj7sNVMbEsjBxm5wLyxK0WdRVuqzr3DgFLLJmn9+EElNDXCJqri7d wv2rfAIWz1gMW8uv0KrsDlSm0WEau+3eLaKwx/untj5pWBo5zyKByeior/qXAInzURib WHAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=NoHeUYNvMZ8Jhd834+2xXSMoTbRof/mPGUP74Vej0KI=; b=jX6EYVheoBrGChQdaJsTvR3fip03tX2DpS6mGtk9j6dA49SpgwN/poQEjWyyLw5cdk TFat67dkWyqZSYP6Iur6Qa3uI8dM350UJA7DWlCj7WxbtHiLOG7J+FsYXIsoeG3y4/Jf hkD46czwIKvOjR9diiG9Jz/cHL4lpJv1M/PDwDzIvEuV3g3VlOZbqfGe92Qo/h04MSkL Vpp74TKlgps3a593UBXAsPbHprRFTk35iJ2vT5B7lEjvXUt7W5JdXdPHlRr4TDuBnhr/ 6UQ7vEn9p7HQIPLVm9qAg81HZBzW5x/i4OvjzDXTFOpIm7452NS3uczUvqQSM/VTPvtf 7Kyg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ionos.com header.s=google header.b=LBgk0PCp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ionos.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qw38-20020a1709066a2600b0073d9c412570si1949234ejc.785.2022.10.25.01.05.36; Tue, 25 Oct 2022 01:06:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@ionos.com header.s=google header.b=LBgk0PCp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ionos.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231657AbiJYHXP (ORCPT + 99 others); Tue, 25 Oct 2022 03:23:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46224 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231645AbiJYHXN (ORCPT ); Tue, 25 Oct 2022 03:23:13 -0400 Received: from mail-ej1-x632.google.com (mail-ej1-x632.google.com [IPv6:2a00:1450:4864:20::632]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 314E8EC1D4 for ; Tue, 25 Oct 2022 00:23:12 -0700 (PDT) Received: by mail-ej1-x632.google.com with SMTP id n12so4908388eja.11 for ; Tue, 25 Oct 2022 00:23:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ionos.com; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=NoHeUYNvMZ8Jhd834+2xXSMoTbRof/mPGUP74Vej0KI=; b=LBgk0PCpfBPpok7ZvdWr7x0ny6qyw6TSmmvEKOZgWagzNVHNLzLpHn2YoTPb5tmQBo RY+v307Piul7gdrJh1x0Sm8dqWjpM9Nhx+/Hj0GRDumZmkeZow7UkWAH+Al8fIPki+Lr 1bI2drwT6VgZsDYSpTsIjF/dZGzT55E1gySMHRHAWZm2j8ufDgp5PQEQZHjgL9x60SAF 8rtKAACbYsDcsJXEcqC4s3xV+/mSXaNZnRSFBof7g9rua/7DNpZA87bwbtjVBbIbKUyo Nyz/nqZrLLNSkx/yvD2DtjB5xLk6Y/Csc8gnPg1LR1XHx3DOYYvzVnB9jxso8SqGnCtB JWHA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=NoHeUYNvMZ8Jhd834+2xXSMoTbRof/mPGUP74Vej0KI=; b=TM6/EW9hgpVNj0wXTdYnHYAe4zs0G7maX4oEILLN37hZ7aZhNrqjvW6MVWgoLIre7i LoJqokXo/fSJYadMfzoREYRANkuhNtkv60PmqvkhLausHuI/gUtLFsd4yNlthoXJxCv0 NQTvKCMYFSMIoQAJmRJFMo8c3yzuChc6h/Wxcxmk9fPd7zQK8znfhTsLAOumDATSvmWj pVxtayQtTxqBQvBbYd7v776aoOsanWwtYtCFtPCgCpPgoio9oWJB8gyz2xSPtH6m56Cz ztRnkt0SJyhZDYH5hsapc0ou/8c6I2lmf5DMu3RGD/cC44S/MgtjG/xIWrv6ODES46f2 WlaA== X-Gm-Message-State: ACrzQf0HP9w58c7O018IsNTUrV/iUo7ectRWq0Zbs32b8D4nGS7a7Ev7 rKkBRwweqVUxtfa7Nf4Wx33tqmFZdmpealLThGP2mA== X-Received: by 2002:a17:906:1e08:b0:73d:c724:4876 with SMTP id g8-20020a1709061e0800b0073dc7244876mr30345435ejj.62.1666682590783; Tue, 25 Oct 2022 00:23:10 -0700 (PDT) MIME-Version: 1.0 References: <20220927120857.639461-1-max.kellermann@ionos.com> <88f8941f-82bf-5152-b49a-56cb2e465abb@redhat.com> <75e7f676-8c85-af0a-97b2-43664f60c811@redhat.com> <7e28f7d1-cfd5-642a-dd4e-ab521885187c@redhat.com> <8ef79208adc82b546cc4c2ba20b5c6ddbc3a2732.camel@kernel.org> <7d40fada-f5f8-4357-c559-18421266f5b4@redhat.com> In-Reply-To: <7d40fada-f5f8-4357-c559-18421266f5b4@redhat.com> From: Max Kellermann Date: Tue, 25 Oct 2022 09:22:59 +0200 Message-ID: Subject: Re: [PATCH] fs/ceph/super: add mount options "snapdir{mode,uid,gid}" To: Xiubo Li Cc: Jeff Layton , idryomov@gmail.com, ceph-devel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 25, 2022 at 3:36 AM Xiubo Li wrote: > Currently cephx permission has already supported the 's' permission, > which means you can do the snapshot create/remove. And for a privileged > or specific mounts you can give them the 's' permission and then only > they can do the snapshot create/remove. And all the others won't. But that's a client permission, not a user permission. I repeat: the problem is that snapshots should only be accessible/discoverable/creatable by certain users (UIDs/GIDs) on the client machine, independent of their permission on the parent directory. My patch decouples parent directory permissions from snapdir permissions, and it's a simple and elegant solution to my problem. > And then use the container or something else to make the specific users > could access to them. Sorry, I don't get it at all. What is "the container or something" and how does it enable me to prevent specific users from accessing snapdirs in their home directories?