ksummit.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: "Coly Li" <colyli@fnnas.com>
To: <ksummit@lists.linux.dev>
Subject: [MAINTAINERS SUMMIT] re-think of richACLs in AI/LLM era
Date: Mon, 8 Sep 2025 16:33:54 +0800	[thread overview]
Message-ID: <DC0B4305-C340-42C2-84B5-8C370794EBC2@fnnas.com> (raw)

Hi folks,

This is Coly Li. I’ve been maintaining bcache for a while and have met Linus,
Greg, Ted, and other maintainers in person at many conferences. Yes, I am a
sustained and reliable kernel developer.

Recently, I joined a startup (https://fnnas.com) that provides AI/LLM
capabilities for personal or micro-enterprise storage. We help users share and
communicate AI/LLM-processed information from their stored data more
conveniently.

Our users can run highly compact LLMs on their own normal and inexpensive
hardware to process photos, videos, and documents using AI. Of course, it’s slow
but that’s expected and acceptable. They can even come back to check the results
weeks later.

In our use case, different people or roles store their personal and sensitive
data in the same storage pool, with different access controls granted to AI/LLM
processing tasks. When they share specific information or data with others
within the same machine or over the internet, the access control hierarchy or
rules become highly complicated and impossible to handle with POSIX ACLs.

We tried bypassing access control to user space, which worked well except for
scalability and performance:
- As the number and size of files increase, storing all access control rules in
  user space memory doesn’t scale—especially on normal machines without huge
  memory resources.
- For some hot data sets (a group of files and directories), checking access
  control rules in user space and hooking back to the kernel is highly
  inefficient.

Therefore, the RichACL project comes back to mind. Of course, RichACL alone
isn’t enough. A high-level policy agent (in user space) is still needed for
task/session-oriented access and sharing policy control, but RichACL can help
implement file system-level access control. This would give us a context-aware
and highly efficient access control implementation.

What I’d like to discuss is:
- After almost 10 years, should we reconsider RichACL in the AI/LLM era?
- What are the major barriers or remaining work needed to get RichACLs into
  upstream?

Since our first public beta was released 13 months ago, we now have over one-
million active installations running daily. This is a real workload for RichACL
and represents real feature demand from end users. If you’re interested in this
topic, we’d be happy to provide more details about the access control
requirements in AI workloads and even show a live demo of the use case.

Thanks in advance.

Coly Li

             reply	other threads:[~2025-09-08  8:36 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-09-08  8:33 Coly Li [this message]
2025-09-08 10:52 ` Jan Kara
2025-09-08 13:47   ` Coly Li
2025-09-08 15:39   ` Steven Rostedt
2025-09-08 15:42     ` Coly Li
2025-09-08 23:22       ` Randy Dunlap
2025-09-09  1:03         ` Paul Moore
2025-09-10 13:32           ` Coly Li
2025-09-10 19:11             ` Paul Moore
2025-09-16 17:12               ` Coly Li
2025-09-16 18:07                 ` Randy Dunlap
2025-09-17  7:59                 ` Jan Kara

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=DC0B4305-C340-42C2-84B5-8C370794EBC2@fnnas.com \
    --to=colyli@fnnas.com \
    --cc=ksummit@lists.linux.dev \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox