Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp554553pxx; Thu, 29 Oct 2020 08:49:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzJZ6g+L+6JrEooryvd4MyZDF2QkejBMKzNGKvY/xY7ijAijn5ZGCMOCIJjiaV238PQzZ/S X-Received: by 2002:aa7:d5d8:: with SMTP id d24mr4967707eds.8.1603986579884; Thu, 29 Oct 2020 08:49:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603986579; cv=none; d=google.com; s=arc-20160816; b=WuQdBSkRspt3n0f7TxxIftrHDoA82mdWgZa4iRsrTIv56s8YMxPzx0Tu7cQSKbvoYo MGNKraoHmL50/FbGkKVm6+oSyOO+51pyL4q8HYQO+tlGFKhNQR7h+sy+TvVUdI7xLHjE JjHOiBNH9hmwb8bsftqarXdoSwvvge2zwhYn3jxx14KBsSVlNxXxnklbqy0suO4eTEjC v/tEp2q+ZspB7KZAMV8D/3oqT8/BUjRq/ypimvbmQiZpKJ8b2rbYLLot6s3wzEvwgV0o +T1LO8ieBK5+IkoKf74LHy9PiO+T4l5r+94N+E3MQBeqeyb/LTex4dQpCYp/tnBtjue4 /jbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:subject:mime-version:user-agent:message-id :in-reply-to:date:references:cc:to:from; bh=EIAuakB+L1IuK5LiIQu+nTdclV8iLOQ5Ic0g1cHT0CI=; b=oYZNB3ieV8yCGmqDahOjnovF8cw4xjfF//rnxi6TG2ifVBeI5CXCUNJSoRRPw+vkz2 /6f3fNjK00TmX+v3NL1QzzZIsmlL5WR1olDy2wxBcoyLHhAzlkZjVOf4iH2aaTHBv8UW BXYWkYwL6pSB8WSO8i7A4gDY9f+zrtNJ290/1Eo13H9eVCaUv8ceFcLKS2RTeNeSsrR7 Lm3m/CDxqEL2k/BRF3UyJSySRLgylNk5M/BERrdw/HX01Nz788xOUjdWldkmtMgoz1Ae PeNVusqlpiZgpWP5CGnmmp3Ol9XjvK2ib11cTEjlPmqNc3O4m9P8Vod15nzjd6jsaD9a QTYA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e13si2968423edj.548.2020.10.29.08.49.16; Thu, 29 Oct 2020 08:49:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728225AbgJ2PsY (ORCPT + 99 others); Thu, 29 Oct 2020 11:48:24 -0400 Received: from out02.mta.xmission.com ([166.70.13.232]:49260 "EHLO out02.mta.xmission.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728146AbgJ2PsX (ORCPT ); Thu, 29 Oct 2020 11:48:23 -0400 Received: from in02.mta.xmission.com ([166.70.13.52]) by out02.mta.xmission.com with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1kYA9W-008Etr-HE; Thu, 29 Oct 2020 09:47:50 -0600 Received: from ip68-227-160-95.om.om.cox.net ([68.227.160.95] helo=x220.xmission.com) by in02.mta.xmission.com with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1kYA9V-00AHk1-Ei; Thu, 29 Oct 2020 09:47:50 -0600 From: ebiederm@xmission.com (Eric W. Biederman) To: Christian Brauner Cc: Alexander Viro , Christoph Hellwig , linux-fsdevel@vger.kernel.org, John Johansen , James Morris , Mimi Zohar , Dmitry Kasatkin , Stephen Smalley , Casey Schaufler , Arnd Bergmann , Andreas Dilger , OGAWA Hirofumi , Geoffrey Thomas , Mrunal Patel , Josh Triplett , Andy Lutomirski , Amir Goldstein , Miklos Szeredi , Theodore Tso , Alban Crequy , Tycho Andersen , David Howells , James Bottomley , Jann Horn , Seth Forshee , =?utf-8?Q?St=C3=A9phane?= Graber , Aleksa Sarai , Lennart Poettering , smbarber@chromium.org, Phil Estes , Serge Hallyn , Kees Cook , Todd Kjos , Jonathan Corbet , containers@lists.linux-foundation.org, linux-security-module@vger.kernel.org, linux-api@vger.kernel.org, linux-ext4@vger.kernel.org, linux-unionfs@vger.kernel.org, linux-audit@redhat.com, linux-integrity@vger.kernel.org, selinux@vger.kernel.org References: <20201029003252.2128653-1-christian.brauner@ubuntu.com> Date: Thu, 29 Oct 2020 10:47:49 -0500 In-Reply-To: <20201029003252.2128653-1-christian.brauner@ubuntu.com> (Christian Brauner's message of "Thu, 29 Oct 2020 01:32:18 +0100") Message-ID: <87pn51ghju.fsf@x220.int.ebiederm.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-XM-SPF: eid=1kYA9V-00AHk1-Ei;;;mid=<87pn51ghju.fsf@x220.int.ebiederm.org>;;;hst=in02.mta.xmission.com;;;ip=68.227.160.95;;;frm=ebiederm@xmission.com;;;spf=neutral X-XM-AID: U2FsdGVkX1/KO2990XPv4odhdV8LRkhzi7akeV9MiV4= X-SA-Exim-Connect-IP: 68.227.160.95 X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on sa08.xmission.com X-Spam-Level: * X-Spam-Status: No, score=1.3 required=8.0 tests=ALL_TRUSTED,BAYES_50, DCC_CHECK_NEGATIVE,T_TM2_M_HEADER_IN_MSG,XMNoVowels autolearn=disabled version=3.4.2 X-Spam-Report: * -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP * 0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60% * [score: 0.4997] * 1.5 XMNoVowels Alpha-numberic number with no vowels * 0.0 T_TM2_M_HEADER_IN_MSG BODY: No description available. * -0.0 DCC_CHECK_NEGATIVE Not listed in DCC * [sa08 1397; Body=1 Fuz1=1 Fuz2=1] X-Spam-DCC: XMission; sa08 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: *;Christian Brauner X-Spam-Relay-Country: X-Spam-Timing: total 395 ms - load_scoreonly_sql: 0.08 (0.0%), signal_user_changed: 15 (3.7%), b_tie_ro: 12 (3.1%), parse: 1.28 (0.3%), extract_message_metadata: 12 (3.1%), get_uri_detail_list: 1.78 (0.5%), tests_pri_-1000: 9 (2.2%), tests_pri_-950: 1.33 (0.3%), tests_pri_-900: 1.21 (0.3%), tests_pri_-90: 82 (20.7%), check_bayes: 80 (20.2%), b_tokenize: 11 (2.7%), b_tok_get_all: 12 (3.1%), b_comp_prob: 4.0 (1.0%), b_tok_touch_all: 47 (11.9%), b_finish: 1.39 (0.4%), tests_pri_0: 262 (66.3%), check_dkim_signature: 0.47 (0.1%), check_dkim_adsp: 3.7 (0.9%), poll_dns_idle: 1.98 (0.5%), tests_pri_10: 2.0 (0.5%), tests_pri_500: 6 (1.6%), rewrite_mail: 0.00 (0.0%) Subject: Re: [PATCH 00/34] fs: idmapped mounts X-SA-Exim-Version: 4.2.1 (built Sat, 08 Feb 2020 21:53:50 +0000) X-SA-Exim-Scanned: Yes (on in02.mta.xmission.com) Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org Christian Brauner writes: > Hey everyone, > > I vanished for a little while to focus on this work here so sorry for > not being available by mail for a while. > > Since quite a long time we have issues with sharing mounts between > multiple unprivileged containers with different id mappings, sharing a > rootfs between multiple containers with different id mappings, and also > sharing regular directories and filesystems between users with different > uids and gids. The latter use-cases have become even more important with > the availability and adoption of systemd-homed (cf. [1]) to implement > portable home directories. Can you walk us through the motivating use case? As of this year's LPC I had the distinct impression that the primary use case for such a feature was due to the RLIMIT_NPROC problem where two containers with the same users still wanted different uid mappings to the disk because the users were conflicting with each other because of the per user rlimits. Fixing rlimits is straight forward to implement, and easier to manage for implementations and administrators. Reading up on systemd-homed it appears to be a way to have encrypted home directories. Those home directories can either be encrypted at the fs or at the block level. Those home directories appear to have the goal of being luggable between systems. If the systems in question don't have common administration of uids and gids after lugging your encrypted home directory to another system chowning the files is required. Is that the use case you are looking at removing the need for systemd-homed to avoid chowning after lugging encrypted home directories from one system to another? Why would it be desirable to avoid the chown? If the goal is to solve fragmented administration of uid assignment I suggest that it might be better to solve the administration problem so that all of the uids of interest get assigned the same way on all of the systems of interest. To the extent it is possible to solve the uid assignment problem that would seem to have fewer long term administrative problems. Eric