Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp556712pxx; Thu, 29 Oct 2020 08:52:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzHcfjhR4mNxlXZNlCMz6JCcTkpCkL9TCPQA2FQLwouiQBR6qr7ZdwehbeBmCET9RVkfq0e X-Received: by 2002:a17:906:eb57:: with SMTP id mc23mr4617648ejb.373.1603986778491; Thu, 29 Oct 2020 08:52:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603986778; cv=none; d=google.com; s=arc-20160816; b=exzF4ZwQtcr2aZ6GcYBhUntgjoBl+4WyD91yUSpX7IJtBeNaAV10xQM5rYt4WsqAth jfu+HTSy8pQKsPK0iTi4fO4pMw/I02652NJAh/1OS9WlXjI72KJ9hi+M1+XrTZ1GouCn d9DRihUj8C0fsDZKr5vnp7VcSgMaBvNQAjVgoaKVnb5VIZrTy6ufSf3VNQ1T66xveWUc 3iHR1n1tCDJ8d0ZPQdsUDwcfIjw8WuJ5CqGyeTB0Fv4d85TPztgf7Ci8uxrNVnuoGmxw BjU5iQB3ZP5X4wcRX+9itziEFK5+Znvwiofcp+WyuuUjOJ2lfsu233iKkAmijwgSUsmx UxHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=CqxVbN5ZYtLYsK74OTXzeiSxAJ7P8vqC3IlkW4xYhqs=; b=wT5N0zbIxPzzBnJ8LmI9JmPatO+BZdULLcmxKHoDpAYUtqjONxslGWFtCCtfQ0Z6qq DN1rANoESQuCzxZ4hlvgqMnhzMD26iBJHHFdotLcuRUnGojVxGwE7QbdX8ix5oGmRS/j wPI3RIexRvoBPRmlAHm5rTF8zTvlCt74pXNSB8vnUCtVIcL8tPbUFtl68vK4REWjZTL6 /W+SLNUbCUGG4IHRHR77hafSxdBOXFxamYXkLoW3nwz9qlbKq5BXFEFmVYSn6Cm23Qnq Ix8KPw1iuOWBF3oxEPlr4xupIQoauMsidOfAP9+gM2URcygwhLReVUMu0vus8cgMyWNb aDYg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v25si2260871edr.36.2020.10.29.08.52.34; Thu, 29 Oct 2020 08:52:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728536AbgJ2PwY (ORCPT + 99 others); Thu, 29 Oct 2020 11:52:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49850 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728491AbgJ2PwX (ORCPT ); Thu, 29 Oct 2020 11:52:23 -0400 Received: from mout-p-103.mailbox.org (mout-p-103.mailbox.org [IPv6:2001:67c:2050::465:103]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 462A0C0613CF; Thu, 29 Oct 2020 08:52:23 -0700 (PDT) Received: from smtp2.mailbox.org (smtp2.mailbox.org [80.241.60.241]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-p-103.mailbox.org (Postfix) with ESMTPS id 4CMVLs2MljzQl31; Thu, 29 Oct 2020 16:52:21 +0100 (CET) X-Virus-Scanned: amavisd-new at heinlein-support.de Received: from smtp2.mailbox.org ([80.241.60.241]) by spamfilter03.heinlein-hosting.de (spamfilter03.heinlein-hosting.de [80.241.56.117]) (amavisd-new, port 10030) with ESMTP id pzROom4hCQJX; Thu, 29 Oct 2020 16:52:14 +0100 (CET) Date: Fri, 30 Oct 2020 02:51:48 +1100 From: Aleksa Sarai To: "Eric W. Biederman" Cc: Christian Brauner , Alexander Viro , Christoph Hellwig , linux-fsdevel@vger.kernel.org, John Johansen , James Morris , Mimi Zohar , Dmitry Kasatkin , Stephen Smalley , Casey Schaufler , Arnd Bergmann , Andreas Dilger , OGAWA Hirofumi , Geoffrey Thomas , Mrunal Patel , Josh Triplett , Andy Lutomirski , Amir Goldstein , Miklos Szeredi , Theodore Tso , Alban Crequy , Tycho Andersen , David Howells , James Bottomley , Jann Horn , Seth Forshee , =?utf-8?B?U3TDqXBoYW5l?= Graber , Lennart Poettering , smbarber@chromium.org, Phil Estes , Serge Hallyn , Kees Cook , Todd Kjos , Jonathan Corbet , containers@lists.linux-foundation.org, linux-security-module@vger.kernel.org, linux-api@vger.kernel.org, linux-ext4@vger.kernel.org, linux-unionfs@vger.kernel.org, linux-audit@redhat.com, linux-integrity@vger.kernel.org, selinux@vger.kernel.org Subject: Re: [PATCH 00/34] fs: idmapped mounts Message-ID: <20201029155148.5odu4j2kt62ahcxq@yavin.dot.cyphar.com> References: <20201029003252.2128653-1-christian.brauner@ubuntu.com> <87pn51ghju.fsf@x220.int.ebiederm.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="kgfxsa7rlwd3wkqj" Content-Disposition: inline In-Reply-To: <87pn51ghju.fsf@x220.int.ebiederm.org> X-MBO-SPAM-Probability: X-Rspamd-Score: -3.91 / 15.00 / 15.00 X-Rspamd-Queue-Id: 6627F1700 X-Rspamd-UID: 698b92 Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org --kgfxsa7rlwd3wkqj Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 2020-10-29, Eric W. Biederman wrote: > Christian Brauner writes: >=20 > > Hey everyone, > > > > I vanished for a little while to focus on this work here so sorry for > > not being available by mail for a while. > > > > Since quite a long time we have issues with sharing mounts between > > multiple unprivileged containers with different id mappings, sharing a > > rootfs between multiple containers with different id mappings, and also > > sharing regular directories and filesystems between users with different > > uids and gids. The latter use-cases have become even more important with > > the availability and adoption of systemd-homed (cf. [1]) to implement > > portable home directories. >=20 > Can you walk us through the motivating use case? >=20 > As of this year's LPC I had the distinct impression that the primary use > case for such a feature was due to the RLIMIT_NPROC problem where two > containers with the same users still wanted different uid mappings to > the disk because the users were conflicting with each other because of > the per user rlimits. >=20 > Fixing rlimits is straight forward to implement, and easier to manage > for implementations and administrators. This is separate to the question of "isolated user namespaces" and managing different mappings between containers. This patchset is solving the same problem that shiftfs solved -- sharing a single directory tree between containers that have different ID mappings. rlimits (nor any of the other proposals we discussed at LPC) will help with this problem. --=20 Aleksa Sarai Senior Software Engineer (Containers) SUSE Linux GmbH --kgfxsa7rlwd3wkqj Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEABYIAB0WIQSxZm6dtfE8gxLLfYqdlLljIbnQEgUCX5rlEgAKCRCdlLljIbnQ EjiPAP9KREQ/2yXGdsYwcSMUpeqUj/wV1rG+UIzAlmjRSy5b2gEA+A5+ZdrAKLCh v+4J3Z/kM0lgTkLGg8Ib1D4QT/HGDQY= =Bh7P -----END PGP SIGNATURE----- --kgfxsa7rlwd3wkqj--