Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp3031007rdg; Tue, 17 Oct 2023 02:21:43 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHUyYlnlr/SMjcfOo0A/wClaa4bW4IClH9Y1wa35WxJnI1VOVtNukkDVuFf6fnGKMjBVW1i X-Received: by 2002:a17:902:f94d:b0:1c5:d8a3:8783 with SMTP id kx13-20020a170902f94d00b001c5d8a38783mr1619774plb.11.1697534503142; Tue, 17 Oct 2023 02:21:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697534503; cv=none; d=google.com; s=arc-20160816; b=L6jYYYy5fiWcZoKVYfDK+39kelOxvaXiIZIxe7cgxpQu56kpITM1fr0TVlKpsAZPOi bRAJeX1GSSPZW642/sXf0Gt+We348qgFSG7J3BezWtUQyerk3MPHNKO0dquv85JoekqW I6vSi/SveiFOQpMqgwVEBBtVpSBeh3567VMsX4FX17QcqCpEXppTn9klB8Hk4GK7SNk1 XphXzVcZvs/uXjFCQPDSx9SjagsrQAb7Fmplw1eDY/ZiL9QEcb4VDsCEWnGroXPIgYLE P0z8DHqVkIc0YFqbsC3PwtrYPcZxnWbNngAcVvAVL2w4TqcKg7mD4LPtUDE55kqOALww YIiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=nNUjVxmpdoA6kyR3JrJWBJibsGUXwZHys8dSVokq2rE=; fh=/pW3tTVWOq6xNxJw8aHCmuca6sVNJgTdP43Ivutlthk=; b=mPYTDnTnO/AcT47Vka8OEG3stN5T+p7v3FhvkgJNN5OML4dQ41TS6xtaNYkh5o26va Rp+9P+zqq6y/I2LMwqwL69ad352viPpNff4A/xqDu3ZfHExm/3WdyAib+TzZEgXh0zms gyGtCJl8qUn8tsKToAWAZHmlSUukVF/D+Wq1M/IoNTo6ffWLu/YG2KxOGxgPkfJkrpuq KTlhMznoF8HrGGtZZ3LiwIKhridm2tKCudsGy9uogrEocUwGBilsnK4Q0BIcKASGJK4e SKN+k3yhzpN7lR7/fR/Uy2K/sMAMa9P8xRttkkZUUkuCz5+0IkNfYIt8KrZyVfZji4JX SBzA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=KFEvA198; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id p3-20020a1709026b8300b001c9b3c3ce7asi1278247plk.300.2023.10.17.02.21.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 17 Oct 2023 02:21:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=KFEvA198; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id DFD858080C43; Tue, 17 Oct 2023 02:21:16 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234815AbjJQJVE (ORCPT + 99 others); Tue, 17 Oct 2023 05:21:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44324 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234880AbjJQJU7 (ORCPT ); Tue, 17 Oct 2023 05:20:59 -0400 Received: from smtp-relay-internal-1.canonical.com (smtp-relay-internal-1.canonical.com [185.125.188.123]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 14CC2115 for ; Tue, 17 Oct 2023 02:20:41 -0700 (PDT) Received: from mail-yw1-f198.google.com (mail-yw1-f198.google.com [209.85.128.198]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id 4F8BF40517 for ; Tue, 17 Oct 2023 09:20:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1697534438; bh=nNUjVxmpdoA6kyR3JrJWBJibsGUXwZHys8dSVokq2rE=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=KFEvA198D+rT/ae5v+D4Bmav0ZEs19EBul+/QaEPm9l59Tqe9FfDfK/Eh/lduQhNE C6Mh86CjVFMg3+x0X+HRsbihxKmfolgBKnp+hPWxqDl4o5HJobrIgvcBH0eCatVjSZ vbk2RSKH+DZx5kWUhurDSleKNaIF9xvBa2XqezQvhl8AhLCMB3+8mezI9sDhZ+Q1J2 y1sM1bVMIvEcaK72KozPUC61JSsmVddL6zT9Bkl1sk82c/zz5zGjLNjLH3T5GZadZp d+sWTt+/wpBECUtFDboPXJMYgogYwnMUGWpvlzp/ZQ6+60hvlGUjPjigdSZQohrbRU NcS869bCapTfg== Received: by mail-yw1-f198.google.com with SMTP id 00721157ae682-5a7b9e83b70so40981147b3.0 for ; Tue, 17 Oct 2023 02:20:38 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697534436; x=1698139236; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=nNUjVxmpdoA6kyR3JrJWBJibsGUXwZHys8dSVokq2rE=; b=F9muAeuaTdgVGyBFqf2kgMRZF2uFguj9zSr+SCFSaCZLXGfComTbOqtYKXzw1ipA8E Qa4rnkMsebsQyZbRJ8frw5nGR7KGmZo/TIPHgeJ3KXm5P1kBNp3i8lyeaqmdExKFuT3g U7QchQQVAnzjBoCyCWu7iZIpUURjSLqKLp9icEt2iAD/N9icrt5h1coQfiAocI8dU3Ls aCqTzHLtDiLQF27aFPY8T/jBamdXF+RKQ1ZoZQa/RX2X/2WIpDKMX3hzLDDjxcEKxz8D PqzgJsNbu8GcJUKwK4arjhvEhhC8kFssNNFM7fL2XS+oPoW8CwtxoCdMpR9F+MjZT+ks wDIA== X-Gm-Message-State: AOJu0Yw14G7qOzaMuJZfMCw49fvEhn5vST8pNby5OkhyDokltGe/QrXZ ss4aI17hIk6HtsgzHiI8fDqtp9hWcoezpYmfgbnSLXMWQPB7V0KzVvasxGwpCNyq+jF2LHELJFa kxnmgoN0vTioClpmpaqAoAwiqdgEO0Aw0Oil5pEPEwcb3TWI0NlMjdDy4+w== X-Received: by 2002:a81:48ce:0:b0:5a7:b3d0:82c2 with SMTP id v197-20020a8148ce000000b005a7b3d082c2mr974302ywa.12.1697534435881; Tue, 17 Oct 2023 02:20:35 -0700 (PDT) X-Received: by 2002:a81:48ce:0:b0:5a7:b3d0:82c2 with SMTP id v197-20020a8148ce000000b005a7b3d082c2mr974288ywa.12.1697534435555; Tue, 17 Oct 2023 02:20:35 -0700 (PDT) MIME-Version: 1.0 References: <20230807132626.182101-1-aleksandr.mikhalitsyn@canonical.com> In-Reply-To: From: Aleksandr Mikhalitsyn Date: Tue, 17 Oct 2023 11:20:24 +0200 Message-ID: Subject: Re: [PATCH v10 00/12] ceph: support idmapped mounts To: Xiubo Li Cc: brauner@kernel.org, stgraber@ubuntu.com, linux-fsdevel@vger.kernel.org, Ilya Dryomov , Jeff Layton , ceph-devel@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Tue, 17 Oct 2023 02:21:17 -0700 (PDT) On Tue, Aug 8, 2023 at 2:45=E2=80=AFAM Xiubo Li wrote: > > LGTM. > > Reviewed-by: Xiubo Li > > I will queue this to the 'testing' branch and then we will run ceph qa > tests. > > Thanks Alex. > > - Xiubo Hi Xiubo, will this series be landed to 6.6? Userspace part was backported and merged to the Ceph Quincy release (https://github.com/ceph/ceph/pull/53139) And waiting to be tested and merged to the Ceph reef and pacific releases. But the kernel part is still in the testing branch. Kind regards, Alex > > On 8/7/23 21:26, Alexander Mikhalitsyn wrote: > > Dear friends, > > > > This patchset was originally developed by Christian Brauner but I'll co= ntinue > > to push it forward. Christian allowed me to do that :) > > > > This feature is already actively used/tested with LXD/LXC project. > > > > Git tree (based on https://github.com/ceph/ceph-client.git testing): > > v10: https://github.com/mihalicyn/linux/commits/fs.idmapped.ceph.v10 > > current: https://github.com/mihalicyn/linux/tree/fs.idmapped.ceph > > > > In the version 3 I've changed only two commits: > > - fs: export mnt_idmap_get/mnt_idmap_put > > - ceph: allow idmapped setattr inode op > > and added a new one: > > - ceph: pass idmap to __ceph_setattr > > > > In the version 4 I've reworked the ("ceph: stash idmapping in mdsc requ= est") > > commit. Now we take idmap refcounter just in place where req->r_mnt_idm= ap > > is filled. It's more safer approach and prevents possible refcounter un= derflow > > on error paths where __register_request wasn't called but ceph_mdsc_rel= ease_request is > > called. > > > > Changelog for version 5: > > - a few commits were squashed into one (as suggested by Xiubo Li) > > - started passing an idmapping everywhere (if possible), so a caller > > UID/GID-s will be mapped almost everywhere (as suggested by Xiubo Li) > > > > Changelog for version 6: > > - rebased on top of testing branch > > - passed an idmapping in a few places (readdir, ceph_netfs_issue_op_inl= ine) > > > > Changelog for version 7: > > - rebased on top of testing branch > > - this thing now requires a new cephfs protocol extension CEPHFS_FEATUR= E_HAS_OWNER_UIDGID > > https://github.com/ceph/ceph/pull/52575 > > > > Changelog for version 8: > > - rebased on top of testing branch > > - added enable_unsafe_idmap module parameter to make idmapped mounts > > work with old MDS server versions > > - properly handled case when old MDS used with new kernel client > > > > Changelog for version 9: > > - added "struct_len" field in struct ceph_mds_request_head as requested= by Xiubo Li > > > > Changelog for version 10: > > - fill struct_len field properly (use cpu_to_le32) > > - add extra checks IS_CEPH_MDS_OP_NEWINODE(..) as requested by Xiubo to= match > > userspace client behavior > > - do not set req->r_mnt_idmap for MKSNAP operation > > - atomic_open: set req->r_mnt_idmap only for CEPH_MDS_OP_CREATE as user= space client does > > > > I can confirm that this version passes xfstests and > > tested with old MDS (without CEPHFS_FEATURE_HAS_OWNER_UIDGID) > > and with recent MDS version. > > > > Links to previous versions: > > v1: https://lore.kernel.org/all/20220104140414.155198-1-brauner@kernel.= org/ > > v2: https://lore.kernel.org/lkml/20230524153316.476973-1-aleksandr.mikh= alitsyn@canonical.com/ > > tree: https://github.com/mihalicyn/linux/commits/fs.idmapped.ceph.v2 > > v3: https://lore.kernel.org/lkml/20230607152038.469739-1-aleksandr.mikh= alitsyn@canonical.com/#t > > v4: https://lore.kernel.org/lkml/20230607180958.645115-1-aleksandr.mikh= alitsyn@canonical.com/#t > > tree: https://github.com/mihalicyn/linux/commits/fs.idmapped.ceph.v4 > > v5: https://lore.kernel.org/lkml/20230608154256.562906-1-aleksandr.mikh= alitsyn@canonical.com/#t > > tree: https://github.com/mihalicyn/linux/commits/fs.idmapped.ceph.v5 > > v6: https://lore.kernel.org/lkml/20230609093125.252186-1-aleksandr.mikh= alitsyn@canonical.com/ > > tree: https://github.com/mihalicyn/linux/commits/fs.idmapped.ceph.v6 > > v7: https://lore.kernel.org/all/20230726141026.307690-1-aleksandr.mikha= litsyn@canonical.com/ > > tree: https://github.com/mihalicyn/linux/commits/fs.idmapped.ceph.v7 > > v8: https://lore.kernel.org/all/20230803135955.230449-1-aleksandr.mikha= litsyn@canonical.com/ > > tree: - > > v9: https://lore.kernel.org/all/20230804084858.126104-1-aleksandr.mikha= litsyn@canonical.com/ > > tree: https://github.com/mihalicyn/linux/commits/fs.idmapped.ceph.v9 > > > > Kind regards, > > Alex > > > > Original description from Christian: > > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > > This patch series enables cephfs to support idmapped mounts, i.e. the > > ability to alter ownership information on a per-mount basis. > > > > Container managers such as LXD support sharaing data via cephfs between > > the host and unprivileged containers and between unprivileged container= s. > > They may all use different idmappings. Idmapped mounts can be used to > > create mounts with the idmapping used for the container (or a different > > one specific to the use-case). > > > > There are in fact more use-cases such as remapping ownership for > > mountpoints on the host itself to grant or restrict access to different > > users or to make it possible to enforce that programs running as root > > will write with a non-zero {g,u}id to disk. > > > > The patch series is simple overall and few changes are needed to cephfs= . > > There is one cephfs specific issue that I would like to discuss and > > solve which I explain in detail in: > > > > [PATCH 02/12] ceph: handle idmapped mounts in create_request_message() > > > > It has to do with how to handle mds serves which have id-based access > > restrictions configured. I would ask you to please take a look at the > > explanation in the aforementioned patch. > > > > The patch series passes the vfs and idmapped mount testsuite as part of > > xfstests. To run it you will need a config like: > > > > [ceph] > > export FSTYP=3Dceph > > export TEST_DIR=3D/mnt/test > > export TEST_DEV=3D10.103.182.10:6789:/ > > export TEST_FS_MOUNT_OPTS=3D"-o name=3Dadmin,secret=3D$password > > > > and then simply call > > > > sudo ./check -g idmapped > > > > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > > > > Alexander Mikhalitsyn (3): > > fs: export mnt_idmap_get/mnt_idmap_put > > ceph: add enable_unsafe_idmap module parameter > > ceph: pass idmap to __ceph_setattr > > > > Christian Brauner (9): > > ceph: stash idmapping in mdsc request > > ceph: handle idmapped mounts in create_request_message() > > ceph: pass an idmapping to mknod/symlink/mkdir > > ceph: allow idmapped getattr inode op > > ceph: allow idmapped permission inode op > > ceph: allow idmapped setattr inode op > > ceph/acl: allow idmapped set_acl inode op > > ceph/file: allow idmapped atomic_open inode op > > ceph: allow idmapped mounts > > > > fs/ceph/acl.c | 6 +-- > > fs/ceph/crypto.c | 2 +- > > fs/ceph/dir.c | 4 ++ > > fs/ceph/file.c | 11 ++++- > > fs/ceph/inode.c | 29 +++++++------ > > fs/ceph/mds_client.c | 78 ++++++++++++++++++++++++++++++++--= - > > fs/ceph/mds_client.h | 8 +++- > > fs/ceph/super.c | 7 +++- > > fs/ceph/super.h | 3 +- > > fs/mnt_idmapping.c | 2 + > > include/linux/ceph/ceph_fs.h | 10 ++++- > > include/linux/mnt_idmapping.h | 3 ++ > > 12 files changed, 136 insertions(+), 27 deletions(-) > > >